Phish Phactors: Offensive and Defensive Strategies

نویسندگان

  • Hal Berghel
  • James Carpinter
  • Ju-Yeon Jo
چکیده

Phishing attacks attempt to fraudulently solicit sensitive information from a user by masquerading as a known trustworthy agent. They commonly use spoofed emails in association with fake websites in order to coerce a user into revealing personal financial data. Phishing is now a serious problem with criminals adopting the well-developed and well-known techniques to exploit Internet users with sophisticated attacks. Phishers are known to have successfully attacked an estimated 1.2 million users and stolen an estimated US$929 million in the twelve

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Analysis of Compound Information Warfare Strategies

The practical defensive and offensive application of Information Warfare most frequently involves the use of complicated compound strategies, in which multichannel and multilayered attacks must be analysed. This paper presents a systematic approach to the analysis problem, which is exploitable for defensive and offensive purposes.

متن کامل

Identifying Functional Variables Affecting the Financial Value of Iran Football Players

The aim of the present study was to identify functional variables affecting the financial value of Iran football players. The research method was qualitative conducted based on the thematic analysis. The statistical population consisted of those with AFC professional coaching certificates, Iran premier league coaches and AFC instructors. The sampling method was purposive and the sampling contin...

متن کامل

0 Fe b 20 06 Alliances versus cover and alliance free sets ∗

A defensive (offensive) k-alliance in Γ = (V,E) is a set S ⊆ V such that for every v ∈ S (v ∈ ∂S), the number of neighbors v has in S is at least k more than the number of neighbors it has in V \ S. A set X ⊆ V is defensive (offensive) k-alliance free, if for all defensive (offensive) k-alliance S, S \ X 6= ∅, i.e., X do not contain any defensive (offensive) k-alliance as a subset. A set Y ⊆ V ...

متن کامل

Effects of coaches’ timeouts on basketball teams’ offensive and defensive performances according to momentary differences in score and game period

The aim of the present study was to assess the effects of game timeouts on basketball teams’ offensive and defensive performances according to momentary differences in score and game period. The sample consisted of 144 timeouts registered during 18 basketball games randomly selected from the 2007 European Basketball Championship (Spain). For each timeout, five ball possessions were registered b...

متن کامل

Body composition and bone mineral density of collegiate American football players

The aim of this study was to compare whole and segmental body composition and bone mineral density of collegiate American football players by playing positions. Forty collegiate American football players voluntarily participated in this study. Participants were categorized by playing positions into one of five categories i.e., defensive linemen, offensive linemen, defensive secondary players, o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Advances in Computers

دوره 70  شماره 

صفحات  -

تاریخ انتشار 2007