SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3264
Research Paper on Spreading Awareness About Phishing Attack Is
Effective In Reducing The Attacks?
Bhakti Ulhas Desai, Guide: Asst. Prof. Gauri Ansurkar
Student, M. Sc IT, Keraleeya Samajam (Regd.) Dombivli’s Model College, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – As a result, an infinite amount of private
information and financial transactions become prone to
cybercriminals. Phishing is an example of a highly effective
sort of cybercrime that allows criminalstodeceiveusersand
steal important data. Since the primary reported phishing
attack in 1990, it's been evolved into a more sophisticated
attack vector. At present, phishing is taken into account one
in every of the foremost frequent samples of fraud activity
on the web. Phishing attacks can cause severe losses for his
or her victims including sensitive information, fraud,
companies, and government secrets. this text aims to guage
these attacks by identifying this state of phishing and
reviewing existing phishing techniques. Studies have
classified phishing attacks in line withfundamental phishing
mechanisms and countermeasures discarding the
importance of the end-to-end lifecycle of phishing.
From this research we understand that phishing attacks are
increasing day by day and people are not able to identify
such type of phishing attack. Giving phishing awareness
training is one way by which we can reduce the number of
attacks.
1. INTRODUCTION
Phishing is variety of attack during which an attacker
sends a fraudulent message designed to trick an
individual into revealing sensitive information to the
attacker or to deploy malicious software on the victim's
infrastructure like ransom ware. Phishing
attacks became increasingly sophisticated and sometimes
transparently mirror the location being targeted, allowing
the attacker or hacker to look at everything while the victim
is navigating the positioning, and transverse any additional
security boundaries with the victim.
There are differing kinds of phishing like Spear Phishing,
Whaling, Vishing and Email Phishing. Spear Phishing-Spear
phishing is an electronic or email communications scam
targeted towards a selected individual, organization or
business. Although often intended to steal data formalicious
purposes, cybercriminals might also will install malwareon
a targeted user’s computer.
Whaling -Whaling is style of attack during which attacker
mainly aimed position persons to steal or access the
sensitive and steer.
Vishing - Vishing is that the combination of voice and
phishing. In vishing attack attacker try and get sensitive
and lead through call.
Vishing is that the phone scam where scammer get your
financial information like account number and password.
Email Phishing -Email phishing could be a form
of attack within which attacker send false mail to user and
trick them to falling for a scam.
2. ADVANTAGES OF PHISHING AWARENESS
TRAINING.
 Empower your employees to become your first
layer of cyber security
In a Web root 2019 study, it absolutely was found that 67%
of employees received a minimum of one phishing email at
work; and 49% of employees admitted they clicked links in
messages from unknown senders during work. Because
the online world is getting more and more interconnected,
cyber attacks have also become more sophisticated. This
includes, but isn't limited to phishing, spear-phishing
attacks, business email compromise, social engineering
scams, common malware and ransom ware and
faux websites to steal data or infect devices.
By providing interactive and ongoing training programs to
your employees, they're going to have the knowledge to
identify phishing emails and avoid risks online, and
eventually will become your first layer of protection to cut
back the quantity of security incidents.
 Meet regulatory compliance requirement
Many businesses have specific compliance requirements. as
an example, if your business takes mastercard payments
from customers, you want to follow PCI compliance. Or if
your company stores or processes personal information
about EU citizens, you need to accommodates the GDPR.
Corporate compliance covers both industry policies and
procedures in addition as federal, provincial and
native compliance laws. Regulatory compliance is when a
corporation abides by those laws and regulations. If an
organization is found to be out of compliance with certain
laws per their industry, this could lead to fines and/or legal
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3265
punishment. for several industries, like financial,healthcare,
education, government, and retail, Cyber Security
Training may be a common growing need as technology
plays a bigger role in information and data handling. This
training is intended to guard users and corporations from
outside digital attack through better end-user practices.
3. WHAT IS THE NEED OF PHISHING AWARENESS
TRAINING
Phishing may be a kind of attack during which a attacker
attempt to gather personal information by impersonating a
legitimate brand and sending users to a malicious website
Phishing awareness training educates persons on a way to
identify and report suspected phishing attempts, to
safeguardthemselvesfromcybercriminalsandhackers.With
help of phishing awareness we will identify the bad actors
who want to disrupt and steal from your organization.
Phishing awareness training refers toa trainingcampaign or
session that educates, train end users on specific phishing
threats they'll encounter in their daily lives.
Effective phishing awareness training initiatives reduce
phishing simulations to reinforce employee understanding,
allowing them to detect and avoid phishing attacks.
Simulating phishing attacks on your workforce also allows
you to test your organization’s maturity regarding its
security awareness posture. Many businesses conduct
regular phishing awareness training to stop employee from
compromising their credentials, downloading malicious
attachments or sending sensitive information to an
impersonator. There’s a typical misconceptionthatphishing
scams are easy to identify which only those that are non-
technical would fall victim. There’s also the false security of
over-relying on technology to forestall phishing.
4. MINIMIZING PHISHING ATTACK IS IMPORTANT:
According to CISCO's 2021 Cyber security Threat Trends
report, about 90% of information breaches occur thanks to
phishing. Spear phishing is that the foremost typical sort of
phishing attack, comprising 65% of all phishing attacks. The
2021 Tessian research revealed that employees receive a
median of 14 malicious emails once a year.
In step with research from the FBI, BEC attacks accounted
for 1/2 the cyber-crime losses which happened in 2019.
By clearly observing both the instance we are ready to
understand that phishing attack may result in huge loss.
Therefore we have to try and do to scale back the phishing
attack.
5. HOW CAN WE PREVENT IT
There are some way using which we can prevent the
phishing attacks. After doing the survey we find some ways
by which we can reduce the phishing attacks.
Know what a phishing scam looks like
Don’t click on suspicious link.
Change password regularly.
Don’t be tempted by pop-ups
Have a Data security platform to spot signs of an attack.
Don’t give out important and sensitive information withany
other.
6. REVIEW
Central issue of the present study is phishing attack that is
rising as a new challenge for twenty first century.
The rapid growth of phishing attacks lead to increase the
economic loss for an organization
Phishing attack cause the release of confidential information
by which attacker can get the access to the victim’saccounts.
Every year number of phishing attacks is increasing so we
need to put mechanism to control it. Phishing awareness
training is one of the solution by which we can reduce the
phishing attacks by training and spreading awarenessabout
these attacks.
7. DATA & RESULTS
After creating our data collection form, we sent it to various
people and collected data on various aspects of what they
think about the Phishing and what idea they have about this
topic.
Questionnaire
 Have you ever heard about 'Phishing'?
 Which type of URL do you use often?
 Do you know the difference between http and
https?
 Do you check email address before opening the
mail?
 Do you report spam or suspicious mails?
 Have you ever attended phishing awareness
session?
These are some of the Questionnaire from the survey
which has been helpful for me in searching forthe result
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3266
of what and how people know about Phishing and how
they deal with Phishing attack.
When people were asked if they knew about phishing or
phishing attack , all of the people were aware about this. In
today’s 21st century everyone is aware about this cyber
related words. When people were asked about how much
they were aware about Phishing attack the results were
impressive as nearly everyone was aware ofit. We rolled out
the survey in such a way that whole family would be able to
answer the question and it was found that all generation
people knew about e-waste management.
1. We reviewed this result and found about that not
everybody knows about the phishing as a result we
can see only 66.7% person knows about phishing.
2. As we can see in the pie chart 100% of the people
use https URL for safe browsing. Most of the people
are aware about how to safely browse and search.
3. As we can see people don’t know have idea about
what is http and https. But in previous pie chart
mostly people use https URL for browsing. May be
they don’t know the difference but they use safe
way to browser. Here half of the peoples don’t have
idea about the URL type.
4. In today’s world everyone uses Email for sending
information. Most of the company or sites or offices
use email to communicate with their client.
According to survey 60% people check the sender
name before opening the mail. So chances ofgetting
phishing attack is less but on the other side 40%
people don’t check email address so it’s a main
threat for occurring phishing attack.
5. Email spam, also known as junk email, refers
to unsolicited email messages, usually sent in bulk
to a large list of recipients.As we can see in the pie
chart nearly 20% people don’t report spam mail,
6. As we can see from below pie chart is 66.7%people
use public Wi-Fi. Public Wi-Fi is sometimes not safe
so occurrence of phishing attack is high.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3267
7. As we can see from the below chat that 42.1%
people don’t block the cookies when they visit the
websites.
Allowing cookies can help websites owner to
streamline your surfing.
8. As we see from below pie chart 80% people didn’t
attend the phishing awareness session. From first
pie chart we can see that everyone has heard about
phishing but they don’t have clear idea about
phishing attack.
8. CONCLUSION
Phishing attacks are a constant threat to campus and are
becoming increasingly sophisticated. Successful Phishing
attacks can: Cause financial loss for victims. Put their
personal information at risk. As from this research we
understand that everyone is having idea about what is
phishing attack but they don’t pay that muchattentiontothe
phishing attack.
Phishing has a list of negative effects on a business,
including loss of money,lossofintellectual property,damage
to reputation, and disruption of operational activities. We
face huge loss because of phishing attack. From the above
survey we can see that phishing awareness training is
important to train people how to deal with this type of
attacks.
9. ACKNOWLEDGEMENT
I would like to thank Keraleeya Samajam’s Model Collegefor
providing me with an opportunity to present this research
paper. And also, I would also like to thank Divya Ma’am and
teaching staff for assistance and comments that greatly
improved the manuscript.
10. REFERENCES
1]Phishing Dark Waters: The Offensive and Defensive
side of malicious Emails.
2]Cyber security Threats, Malware Trends and
Strategies: Learn to mitigate exploits, malware,
phishing and other social engineering attacks
3]Wikipedia for Phishing attacks
4]Figure, charts and survey results
https://forms.gle/o5FtC34crWVngnX18

More Related Content

Similar to Research Paper on Spreading Awareness About Phishing Attack Is Effective In Reducing The Attacks

Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxArindamGhosal6
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2Conf
 
Advanced Phishing The Art of Stealing
Advanced Phishing The Art of StealingAdvanced Phishing The Art of Stealing
Advanced Phishing The Art of StealingAvinash Sinha
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detectionijtsrd
 
Phishing website method
Phishing website methodPhishing website method
Phishing website methodarelyf_7
 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineeringijtsrd
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...IJNSA Journal
 
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET Journal
 
Advanced phishing the art of stealing
Advanced phishing   the art of stealingAdvanced phishing   the art of stealing
Advanced phishing the art of stealingprj_publication
 
Advanced phishing the art of stealing
Advanced phishing   the art of stealingAdvanced phishing   the art of stealing
Advanced phishing the art of stealingprj_publication
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber securitySlamet Ar Rokhim
 

Similar to Research Paper on Spreading Awareness About Phishing Attack Is Effective In Reducing The Attacks (20)

Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docx
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
 
Advanced Phishing The Art of Stealing
Advanced Phishing The Art of StealingAdvanced Phishing The Art of Stealing
Advanced Phishing The Art of Stealing
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
 
Cyber security
Cyber securityCyber security
Cyber security
 
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health CareUnderstanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
 
Phishing website method
Phishing website methodPhishing website method
Phishing website method
 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineering
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
 
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
 
Advanced phishing the art of stealing
Advanced phishing   the art of stealingAdvanced phishing   the art of stealing
Advanced phishing the art of stealing
 
Advanced phishing the art of stealing
Advanced phishing   the art of stealingAdvanced phishing   the art of stealing
Advanced phishing the art of stealing
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 

Recently uploaded (20)

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 

Research Paper on Spreading Awareness About Phishing Attack Is Effective In Reducing The Attacks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3264 Research Paper on Spreading Awareness About Phishing Attack Is Effective In Reducing The Attacks? Bhakti Ulhas Desai, Guide: Asst. Prof. Gauri Ansurkar Student, M. Sc IT, Keraleeya Samajam (Regd.) Dombivli’s Model College, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – As a result, an infinite amount of private information and financial transactions become prone to cybercriminals. Phishing is an example of a highly effective sort of cybercrime that allows criminalstodeceiveusersand steal important data. Since the primary reported phishing attack in 1990, it's been evolved into a more sophisticated attack vector. At present, phishing is taken into account one in every of the foremost frequent samples of fraud activity on the web. Phishing attacks can cause severe losses for his or her victims including sensitive information, fraud, companies, and government secrets. this text aims to guage these attacks by identifying this state of phishing and reviewing existing phishing techniques. Studies have classified phishing attacks in line withfundamental phishing mechanisms and countermeasures discarding the importance of the end-to-end lifecycle of phishing. From this research we understand that phishing attacks are increasing day by day and people are not able to identify such type of phishing attack. Giving phishing awareness training is one way by which we can reduce the number of attacks. 1. INTRODUCTION Phishing is variety of attack during which an attacker sends a fraudulent message designed to trick an individual into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransom ware. Phishing attacks became increasingly sophisticated and sometimes transparently mirror the location being targeted, allowing the attacker or hacker to look at everything while the victim is navigating the positioning, and transverse any additional security boundaries with the victim. There are differing kinds of phishing like Spear Phishing, Whaling, Vishing and Email Phishing. Spear Phishing-Spear phishing is an electronic or email communications scam targeted towards a selected individual, organization or business. Although often intended to steal data formalicious purposes, cybercriminals might also will install malwareon a targeted user’s computer. Whaling -Whaling is style of attack during which attacker mainly aimed position persons to steal or access the sensitive and steer. Vishing - Vishing is that the combination of voice and phishing. In vishing attack attacker try and get sensitive and lead through call. Vishing is that the phone scam where scammer get your financial information like account number and password. Email Phishing -Email phishing could be a form of attack within which attacker send false mail to user and trick them to falling for a scam. 2. ADVANTAGES OF PHISHING AWARENESS TRAINING.  Empower your employees to become your first layer of cyber security In a Web root 2019 study, it absolutely was found that 67% of employees received a minimum of one phishing email at work; and 49% of employees admitted they clicked links in messages from unknown senders during work. Because the online world is getting more and more interconnected, cyber attacks have also become more sophisticated. This includes, but isn't limited to phishing, spear-phishing attacks, business email compromise, social engineering scams, common malware and ransom ware and faux websites to steal data or infect devices. By providing interactive and ongoing training programs to your employees, they're going to have the knowledge to identify phishing emails and avoid risks online, and eventually will become your first layer of protection to cut back the quantity of security incidents.  Meet regulatory compliance requirement Many businesses have specific compliance requirements. as an example, if your business takes mastercard payments from customers, you want to follow PCI compliance. Or if your company stores or processes personal information about EU citizens, you need to accommodates the GDPR. Corporate compliance covers both industry policies and procedures in addition as federal, provincial and native compliance laws. Regulatory compliance is when a corporation abides by those laws and regulations. If an organization is found to be out of compliance with certain laws per their industry, this could lead to fines and/or legal
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3265 punishment. for several industries, like financial,healthcare, education, government, and retail, Cyber Security Training may be a common growing need as technology plays a bigger role in information and data handling. This training is intended to guard users and corporations from outside digital attack through better end-user practices. 3. WHAT IS THE NEED OF PHISHING AWARENESS TRAINING Phishing may be a kind of attack during which a attacker attempt to gather personal information by impersonating a legitimate brand and sending users to a malicious website Phishing awareness training educates persons on a way to identify and report suspected phishing attempts, to safeguardthemselvesfromcybercriminalsandhackers.With help of phishing awareness we will identify the bad actors who want to disrupt and steal from your organization. Phishing awareness training refers toa trainingcampaign or session that educates, train end users on specific phishing threats they'll encounter in their daily lives. Effective phishing awareness training initiatives reduce phishing simulations to reinforce employee understanding, allowing them to detect and avoid phishing attacks. Simulating phishing attacks on your workforce also allows you to test your organization’s maturity regarding its security awareness posture. Many businesses conduct regular phishing awareness training to stop employee from compromising their credentials, downloading malicious attachments or sending sensitive information to an impersonator. There’s a typical misconceptionthatphishing scams are easy to identify which only those that are non- technical would fall victim. There’s also the false security of over-relying on technology to forestall phishing. 4. MINIMIZING PHISHING ATTACK IS IMPORTANT: According to CISCO's 2021 Cyber security Threat Trends report, about 90% of information breaches occur thanks to phishing. Spear phishing is that the foremost typical sort of phishing attack, comprising 65% of all phishing attacks. The 2021 Tessian research revealed that employees receive a median of 14 malicious emails once a year. In step with research from the FBI, BEC attacks accounted for 1/2 the cyber-crime losses which happened in 2019. By clearly observing both the instance we are ready to understand that phishing attack may result in huge loss. Therefore we have to try and do to scale back the phishing attack. 5. HOW CAN WE PREVENT IT There are some way using which we can prevent the phishing attacks. After doing the survey we find some ways by which we can reduce the phishing attacks. Know what a phishing scam looks like Don’t click on suspicious link. Change password regularly. Don’t be tempted by pop-ups Have a Data security platform to spot signs of an attack. Don’t give out important and sensitive information withany other. 6. REVIEW Central issue of the present study is phishing attack that is rising as a new challenge for twenty first century. The rapid growth of phishing attacks lead to increase the economic loss for an organization Phishing attack cause the release of confidential information by which attacker can get the access to the victim’saccounts. Every year number of phishing attacks is increasing so we need to put mechanism to control it. Phishing awareness training is one of the solution by which we can reduce the phishing attacks by training and spreading awarenessabout these attacks. 7. DATA & RESULTS After creating our data collection form, we sent it to various people and collected data on various aspects of what they think about the Phishing and what idea they have about this topic. Questionnaire  Have you ever heard about 'Phishing'?  Which type of URL do you use often?  Do you know the difference between http and https?  Do you check email address before opening the mail?  Do you report spam or suspicious mails?  Have you ever attended phishing awareness session? These are some of the Questionnaire from the survey which has been helpful for me in searching forthe result
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3266 of what and how people know about Phishing and how they deal with Phishing attack. When people were asked if they knew about phishing or phishing attack , all of the people were aware about this. In today’s 21st century everyone is aware about this cyber related words. When people were asked about how much they were aware about Phishing attack the results were impressive as nearly everyone was aware ofit. We rolled out the survey in such a way that whole family would be able to answer the question and it was found that all generation people knew about e-waste management. 1. We reviewed this result and found about that not everybody knows about the phishing as a result we can see only 66.7% person knows about phishing. 2. As we can see in the pie chart 100% of the people use https URL for safe browsing. Most of the people are aware about how to safely browse and search. 3. As we can see people don’t know have idea about what is http and https. But in previous pie chart mostly people use https URL for browsing. May be they don’t know the difference but they use safe way to browser. Here half of the peoples don’t have idea about the URL type. 4. In today’s world everyone uses Email for sending information. Most of the company or sites or offices use email to communicate with their client. According to survey 60% people check the sender name before opening the mail. So chances ofgetting phishing attack is less but on the other side 40% people don’t check email address so it’s a main threat for occurring phishing attack. 5. Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.As we can see in the pie chart nearly 20% people don’t report spam mail, 6. As we can see from below pie chart is 66.7%people use public Wi-Fi. Public Wi-Fi is sometimes not safe so occurrence of phishing attack is high.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3267 7. As we can see from the below chat that 42.1% people don’t block the cookies when they visit the websites. Allowing cookies can help websites owner to streamline your surfing. 8. As we see from below pie chart 80% people didn’t attend the phishing awareness session. From first pie chart we can see that everyone has heard about phishing but they don’t have clear idea about phishing attack. 8. CONCLUSION Phishing attacks are a constant threat to campus and are becoming increasingly sophisticated. Successful Phishing attacks can: Cause financial loss for victims. Put their personal information at risk. As from this research we understand that everyone is having idea about what is phishing attack but they don’t pay that muchattentiontothe phishing attack. Phishing has a list of negative effects on a business, including loss of money,lossofintellectual property,damage to reputation, and disruption of operational activities. We face huge loss because of phishing attack. From the above survey we can see that phishing awareness training is important to train people how to deal with this type of attacks. 9. ACKNOWLEDGEMENT I would like to thank Keraleeya Samajam’s Model Collegefor providing me with an opportunity to present this research paper. And also, I would also like to thank Divya Ma’am and teaching staff for assistance and comments that greatly improved the manuscript. 10. REFERENCES 1]Phishing Dark Waters: The Offensive and Defensive side of malicious Emails. 2]Cyber security Threats, Malware Trends and Strategies: Learn to mitigate exploits, malware, phishing and other social engineering attacks 3]Wikipedia for Phishing attacks 4]Figure, charts and survey results https://forms.gle/o5FtC34crWVngnX18