Submit Search
Upload
Research Paper on Spreading Awareness About Phishing Attack Is Effective In Reducing The Attacks
•
0 likes
•
18 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i4/IRJET-V9I4452.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
IRJET- Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing Techniques
IRJET Journal
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
csandit
Spear Phishing
Spear Phishing
- Mark - Fullbright
Phishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
IRJET Journal
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
IRJET Journal
What you need to know about cyber security
What you need to know about cyber security
Carol Meng-Shih Wang
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx
ArindamGhosal6
Cybersecurity awareness.pdf
Cybersecurity awareness.pdf
CRO Cyber Rights Organization
Recommended
IRJET- Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing Techniques
IRJET Journal
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
csandit
Spear Phishing
Spear Phishing
- Mark - Fullbright
Phishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
IRJET Journal
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
IRJET Journal
What you need to know about cyber security
What you need to know about cyber security
Carol Meng-Shih Wang
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx
ArindamGhosal6
Cybersecurity awareness.pdf
Cybersecurity awareness.pdf
CRO Cyber Rights Organization
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docx
ArindamGhosal6
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
Skillmine Technology Consulting
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
Skillmine Technology Consulting
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
RapidSSLOnline.com
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2Conf
Advanced Phishing The Art of Stealing
Advanced Phishing The Art of Stealing
Avinash Sinha
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
ijtsrd
Cyber security
Cyber security
Satbharai Sethar
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
Blue Cross Blue Shield of Michigan
Phishing website method
Phishing website method
arelyf_7
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineering
ijtsrd
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2Conf
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
thinkwithniche
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
IJNSA Journal
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET Journal
Advanced phishing the art of stealing
Advanced phishing the art of stealing
prj_publication
Advanced phishing the art of stealing
Advanced phishing the art of stealing
prj_publication
Introduction to cyber security
Introduction to cyber security
RaviPrashant5
introduction to cyber security
introduction to cyber security
Slamet Ar Rokhim
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Research Paper on Spreading Awareness About Phishing Attack Is Effective In Reducing The Attacks
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docx
ArindamGhosal6
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
Skillmine Technology Consulting
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
Skillmine Technology Consulting
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
RapidSSLOnline.com
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2Conf
Advanced Phishing The Art of Stealing
Advanced Phishing The Art of Stealing
Avinash Sinha
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
ijtsrd
Cyber security
Cyber security
Satbharai Sethar
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
Blue Cross Blue Shield of Michigan
Phishing website method
Phishing website method
arelyf_7
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineering
ijtsrd
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2Conf
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
thinkwithniche
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
IJNSA Journal
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET Journal
Advanced phishing the art of stealing
Advanced phishing the art of stealing
prj_publication
Advanced phishing the art of stealing
Advanced phishing the art of stealing
prj_publication
Introduction to cyber security
Introduction to cyber security
RaviPrashant5
introduction to cyber security
introduction to cyber security
Slamet Ar Rokhim
Similar to Research Paper on Spreading Awareness About Phishing Attack Is Effective In Reducing The Attacks
(20)
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docx
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Advanced Phishing The Art of Stealing
Advanced Phishing The Art of Stealing
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
Cyber security
Cyber security
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
Phishing website method
Phishing website method
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
Advanced phishing the art of stealing
Advanced phishing the art of stealing
Advanced phishing the art of stealing
Advanced phishing the art of stealing
Introduction to cyber security
Introduction to cyber security
introduction to cyber security
introduction to cyber security
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
koyaldeepu123
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
Recently uploaded
(20)
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In Reducing The Attacks
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3264 Research Paper on Spreading Awareness About Phishing Attack Is Effective In Reducing The Attacks? Bhakti Ulhas Desai, Guide: Asst. Prof. Gauri Ansurkar Student, M. Sc IT, Keraleeya Samajam (Regd.) Dombivli’s Model College, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – As a result, an infinite amount of private information and financial transactions become prone to cybercriminals. Phishing is an example of a highly effective sort of cybercrime that allows criminalstodeceiveusersand steal important data. Since the primary reported phishing attack in 1990, it's been evolved into a more sophisticated attack vector. At present, phishing is taken into account one in every of the foremost frequent samples of fraud activity on the web. Phishing attacks can cause severe losses for his or her victims including sensitive information, fraud, companies, and government secrets. this text aims to guage these attacks by identifying this state of phishing and reviewing existing phishing techniques. Studies have classified phishing attacks in line withfundamental phishing mechanisms and countermeasures discarding the importance of the end-to-end lifecycle of phishing. From this research we understand that phishing attacks are increasing day by day and people are not able to identify such type of phishing attack. Giving phishing awareness training is one way by which we can reduce the number of attacks. 1. INTRODUCTION Phishing is variety of attack during which an attacker sends a fraudulent message designed to trick an individual into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransom ware. Phishing attacks became increasingly sophisticated and sometimes transparently mirror the location being targeted, allowing the attacker or hacker to look at everything while the victim is navigating the positioning, and transverse any additional security boundaries with the victim. There are differing kinds of phishing like Spear Phishing, Whaling, Vishing and Email Phishing. Spear Phishing-Spear phishing is an electronic or email communications scam targeted towards a selected individual, organization or business. Although often intended to steal data formalicious purposes, cybercriminals might also will install malwareon a targeted user’s computer. Whaling -Whaling is style of attack during which attacker mainly aimed position persons to steal or access the sensitive and steer. Vishing - Vishing is that the combination of voice and phishing. In vishing attack attacker try and get sensitive and lead through call. Vishing is that the phone scam where scammer get your financial information like account number and password. Email Phishing -Email phishing could be a form of attack within which attacker send false mail to user and trick them to falling for a scam. 2. ADVANTAGES OF PHISHING AWARENESS TRAINING. Empower your employees to become your first layer of cyber security In a Web root 2019 study, it absolutely was found that 67% of employees received a minimum of one phishing email at work; and 49% of employees admitted they clicked links in messages from unknown senders during work. Because the online world is getting more and more interconnected, cyber attacks have also become more sophisticated. This includes, but isn't limited to phishing, spear-phishing attacks, business email compromise, social engineering scams, common malware and ransom ware and faux websites to steal data or infect devices. By providing interactive and ongoing training programs to your employees, they're going to have the knowledge to identify phishing emails and avoid risks online, and eventually will become your first layer of protection to cut back the quantity of security incidents. Meet regulatory compliance requirement Many businesses have specific compliance requirements. as an example, if your business takes mastercard payments from customers, you want to follow PCI compliance. Or if your company stores or processes personal information about EU citizens, you need to accommodates the GDPR. Corporate compliance covers both industry policies and procedures in addition as federal, provincial and native compliance laws. Regulatory compliance is when a corporation abides by those laws and regulations. If an organization is found to be out of compliance with certain laws per their industry, this could lead to fines and/or legal
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3265 punishment. for several industries, like financial,healthcare, education, government, and retail, Cyber Security Training may be a common growing need as technology plays a bigger role in information and data handling. This training is intended to guard users and corporations from outside digital attack through better end-user practices. 3. WHAT IS THE NEED OF PHISHING AWARENESS TRAINING Phishing may be a kind of attack during which a attacker attempt to gather personal information by impersonating a legitimate brand and sending users to a malicious website Phishing awareness training educates persons on a way to identify and report suspected phishing attempts, to safeguardthemselvesfromcybercriminalsandhackers.With help of phishing awareness we will identify the bad actors who want to disrupt and steal from your organization. Phishing awareness training refers toa trainingcampaign or session that educates, train end users on specific phishing threats they'll encounter in their daily lives. Effective phishing awareness training initiatives reduce phishing simulations to reinforce employee understanding, allowing them to detect and avoid phishing attacks. Simulating phishing attacks on your workforce also allows you to test your organization’s maturity regarding its security awareness posture. Many businesses conduct regular phishing awareness training to stop employee from compromising their credentials, downloading malicious attachments or sending sensitive information to an impersonator. There’s a typical misconceptionthatphishing scams are easy to identify which only those that are non- technical would fall victim. There’s also the false security of over-relying on technology to forestall phishing. 4. MINIMIZING PHISHING ATTACK IS IMPORTANT: According to CISCO's 2021 Cyber security Threat Trends report, about 90% of information breaches occur thanks to phishing. Spear phishing is that the foremost typical sort of phishing attack, comprising 65% of all phishing attacks. The 2021 Tessian research revealed that employees receive a median of 14 malicious emails once a year. In step with research from the FBI, BEC attacks accounted for 1/2 the cyber-crime losses which happened in 2019. By clearly observing both the instance we are ready to understand that phishing attack may result in huge loss. Therefore we have to try and do to scale back the phishing attack. 5. HOW CAN WE PREVENT IT There are some way using which we can prevent the phishing attacks. After doing the survey we find some ways by which we can reduce the phishing attacks. Know what a phishing scam looks like Don’t click on suspicious link. Change password regularly. Don’t be tempted by pop-ups Have a Data security platform to spot signs of an attack. Don’t give out important and sensitive information withany other. 6. REVIEW Central issue of the present study is phishing attack that is rising as a new challenge for twenty first century. The rapid growth of phishing attacks lead to increase the economic loss for an organization Phishing attack cause the release of confidential information by which attacker can get the access to the victim’saccounts. Every year number of phishing attacks is increasing so we need to put mechanism to control it. Phishing awareness training is one of the solution by which we can reduce the phishing attacks by training and spreading awarenessabout these attacks. 7. DATA & RESULTS After creating our data collection form, we sent it to various people and collected data on various aspects of what they think about the Phishing and what idea they have about this topic. Questionnaire Have you ever heard about 'Phishing'? Which type of URL do you use often? Do you know the difference between http and https? Do you check email address before opening the mail? Do you report spam or suspicious mails? Have you ever attended phishing awareness session? These are some of the Questionnaire from the survey which has been helpful for me in searching forthe result
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3266 of what and how people know about Phishing and how they deal with Phishing attack. When people were asked if they knew about phishing or phishing attack , all of the people were aware about this. In today’s 21st century everyone is aware about this cyber related words. When people were asked about how much they were aware about Phishing attack the results were impressive as nearly everyone was aware ofit. We rolled out the survey in such a way that whole family would be able to answer the question and it was found that all generation people knew about e-waste management. 1. We reviewed this result and found about that not everybody knows about the phishing as a result we can see only 66.7% person knows about phishing. 2. As we can see in the pie chart 100% of the people use https URL for safe browsing. Most of the people are aware about how to safely browse and search. 3. As we can see people don’t know have idea about what is http and https. But in previous pie chart mostly people use https URL for browsing. May be they don’t know the difference but they use safe way to browser. Here half of the peoples don’t have idea about the URL type. 4. In today’s world everyone uses Email for sending information. Most of the company or sites or offices use email to communicate with their client. According to survey 60% people check the sender name before opening the mail. So chances ofgetting phishing attack is less but on the other side 40% people don’t check email address so it’s a main threat for occurring phishing attack. 5. Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.As we can see in the pie chart nearly 20% people don’t report spam mail, 6. As we can see from below pie chart is 66.7%people use public Wi-Fi. Public Wi-Fi is sometimes not safe so occurrence of phishing attack is high.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3267 7. As we can see from the below chat that 42.1% people don’t block the cookies when they visit the websites. Allowing cookies can help websites owner to streamline your surfing. 8. As we see from below pie chart 80% people didn’t attend the phishing awareness session. From first pie chart we can see that everyone has heard about phishing but they don’t have clear idea about phishing attack. 8. CONCLUSION Phishing attacks are a constant threat to campus and are becoming increasingly sophisticated. Successful Phishing attacks can: Cause financial loss for victims. Put their personal information at risk. As from this research we understand that everyone is having idea about what is phishing attack but they don’t pay that muchattentiontothe phishing attack. Phishing has a list of negative effects on a business, including loss of money,lossofintellectual property,damage to reputation, and disruption of operational activities. We face huge loss because of phishing attack. From the above survey we can see that phishing awareness training is important to train people how to deal with this type of attacks. 9. ACKNOWLEDGEMENT I would like to thank Keraleeya Samajam’s Model Collegefor providing me with an opportunity to present this research paper. And also, I would also like to thank Divya Ma’am and teaching staff for assistance and comments that greatly improved the manuscript. 10. REFERENCES 1]Phishing Dark Waters: The Offensive and Defensive side of malicious Emails. 2]Cyber security Threats, Malware Trends and Strategies: Learn to mitigate exploits, malware, phishing and other social engineering attacks 3]Wikipedia for Phishing attacks 4]Figure, charts and survey results https://forms.gle/o5FtC34crWVngnX18
Download now