Phishing Mitigation: The Effect of Using Attack-Based Understanding Techniques

A.E. DUROSIMI, D.W.S. ALAUSA

Abstract: Most internet users have encountered series of electronic deception (Phishing) in form of e-mails originating from malicious source and made to persuade the recipient to hand over personal information such as credit card details. These criminals often pose as ones bank or financial institution employer or any other entity you normally trust with your information. These phishing crimes can be solved using HTTPS, which is a more secure protocol than HTTP as it encrypts your browser and all information sent or received. Also, the use of firewall prevents many browser hijackers and effective against virus attacks. Thus users can secure their confidential information from phishing attacks by checking that the padlock appeared on the top or bottom of the webpage before entering login details, which shows that users are communicating with the real website.

Keywords: Phishing, fraud, detection, E-mail.

Title: Phishing Mitigation: The Effect of Using Attack-Based Understanding Techniques

Author: A.E. DUROSIMI, D.W.S. ALAUSA

International Journal of Computer Science and Information Technology Research

ISSN 2348-1196 (print), ISSN 2348-120X (online)

Research Publish Journals

Vol. 3, Issue 1, January 2015 - March 2015

Citation
Share : Facebook Twitter Linked In

Citation
Phishing Mitigation: The Effect of Using Attack-Based Understanding Techniques by A.E. DUROSIMI, D.W.S. ALAUSA