- Home
- About Us & Project Introduction
- What Are "Cyber Security" and "Cyber Attack"?
- Why Does Cyber Security Matter?
- International and Local Cooperation on Cyber Attacks
- Simple Steps Towards Enhanced Cyber Security
- Educating the Public
- Video Reviews & Useful Resources
- Bibliography
- Acknowledgements
Phising
Phising is a form of social engineering, whereby attackers disguise themselves as trusted entities in communication, to acquire information such as passwords and personal details.
A common method of Phising involves a user being directed to a "look-alike" site, mimicking an email or online banking login page. When the user enters his details and submits them, these are captured by the attacker and can be sold for profit on the internet black market.
Other than through education to increase awareness of fraud through the internet, web browsers like Google Chrome now reference lists that can warn users if a site is potentially unsafe. Crowd-sourced tools like the WOT allow users to share information about the integrity of the site. However, lists and user reviews are far from complete as new phising sites spring up to replace those that are blacklisted.
Therefore, to observe login pages carefully and checking the integrity of email senders are still more effective in combating phising.
Quick Reference
Webopedia Computer Dictionary. (n.d.). What is phishing?. Retrieved from http://www.webopedia.com/TERM/P/phishing.html
Wilson, T. V. (n.d.). How phishing works? Retrieved from http://computer.howstuffworks.com/phishing.htm
Previous Next
A common method of Phising involves a user being directed to a "look-alike" site, mimicking an email or online banking login page. When the user enters his details and submits them, these are captured by the attacker and can be sold for profit on the internet black market.
Other than through education to increase awareness of fraud through the internet, web browsers like Google Chrome now reference lists that can warn users if a site is potentially unsafe. Crowd-sourced tools like the WOT allow users to share information about the integrity of the site. However, lists and user reviews are far from complete as new phising sites spring up to replace those that are blacklisted.
Therefore, to observe login pages carefully and checking the integrity of email senders are still more effective in combating phising.
Quick Reference
Webopedia Computer Dictionary. (n.d.). What is phishing?. Retrieved from http://www.webopedia.com/TERM/P/phishing.html
Wilson, T. V. (n.d.). How phishing works? Retrieved from http://computer.howstuffworks.com/phishing.htm
Previous Next