Explore chapters and articles related to this topic
Awareness of Cybercrime against Women among Students of Higher Educational Institutes in Delhi
Published in Madhu Arora, Poonam Khurana, Sonam Choiden, Performance Management, 2020
Kamini Rai, Bhajneet Kaur, Supriya Sardana
Email Spoofing: An act in which the address of the sender of an email is altered, so that it appears that the mail has been sent by a known or otherwise authentic person (Agarwal and Kaushik, 2014). Email spoofing is interrelated with impersonation, whereby one person purports to be another, i.e., cheating by pretending to be another person (Uma, 2017). Here, the harasser, by hiding his true identity, can drag a female into an emotional relationship and blackmail the victim (Halder et al., 2010).
Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning
Published in Behaviour & Information Technology, 2023
Neha Chhabra Roy, Sreeleakha Prabhakaran
Phishing awareness emails are a simple and cost-effective way of proactively defending against a cyberattack (Marlin and Jarrall 2016; Roy and Prabhakaran 2022a; Roy and Vishwanathan 2020). Email spoofing can be prevented by the mail flow rule configured to display the ‘External email warning’ message. Employees who receive these warnings become cautious when opening suspicious emails, links, or attachments (Murphy et al. 2022). In addition to cyber awareness training, cybersecurity policies should include these measures (Drew and Farrell 2018). Employees must be cautioned against opening suspicious email links and attachments. Educating the employee about the risks and threats may also be suggested. However, suppose the employee does so even after being warned, disciplinary action must be taken against them, as it will be assumed that the employee has been wilfully unethical and has not acted out of ignorance (Brewer 2015). (Figure 5)
A survey of phishing attack techniques, defence mechanisms and open research challenges
Published in Enterprise Information Systems, 2022
The phisher targets the vulnerability available in the system due to the human causes (Hong 2012). The phishing attacks are classified into various categories based on how the attacker acquires the credentials of users. Figure 5 presents taxonomy of phishing attacking techniques. This section discusses the phishing attack on two environments, namely, desktop and mobile. In the desktop environment, attackers utilise social engineering and technical subterfuge techniques. Attackers execute social engineering-based attacks using the malicious website or sending the fake email that appears to be legitimate. Social engineering techniques are further categorised as email spoofing, website spoofing and spear phishing (Almomani et al. 2013). Technical subterfuge methods gain user’s information by installing malware (Jain and Gupta 2017).
Classification of various attacks and their defence mechanism in online social networks: a survey
Published in Enterprise Information Systems, 2019
Somya Ranjan Sahoo, Brij Bhooshan Gupta
Phishing attacks: Phishing attack can act as delivery vehicle for malwares. More than 85% of organisations have suffered from phishing attack. Out of all, 30% of phishing emails get opened. The best delivery vehicle for malware is an email attachment. The top five malware vectors within crime ware are web drive by (61%), download by malware (10%), email link (39%), email attachment (63%) and network propagation (10%). To elicit personal information, attacker creates a replica of an existing page to scatter an online user network. Phishing attack (Tian, Yuan, and Yu 2016) is the compounding of social engineering and technical methods to win over user to reveal their personal information. It can be carried out by email spoofing and instant messaging.