Revolutionizing Education with AI: Recent Developments and Future Directions
EOI: 10.11242/viva-tech.01.05.001
Citation
Chandani Patel,Tejas Nikam,"PHISHING TECHNOLOGY", VIVA-IJRI Volume 1, Issue 7, Article 1, pp. 1-5, 2024. Published by Master of Computer Application Department, VIVA Institute of Technology, Virar, India.
Abstract
Phishing attacks, social engineering, Cybersecurity threats, Email phishing, Website spoofing
References
- "Phishing Exposed" by Lance James, Steven Adair, and Blake Darché - This book provides insights into the techniques used by hackers in phishing attacks and offers strategies for defending against them.
- "The Art of Deception: Controlling the Human Element of Security" by Kevin D. Mitnick and William L. Simon - Although not solely focused on phishing, this book explores various methods of social engineering, including phishing, and how individuals can be manipulated into divulging sensitive information.
- ]"Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails" by Christopher Hadnagy and Michele Fincher - This book delves into the psychology behind phishing attacks and provides guidance on both defending against them and conducting ethical phishing tests for organizational security.
- Countering Fraud for Competitive Advantage: The Professional Approach to Reducing the Last Great Hidden Cost" by Peter Goldmann - This book discusses various types of fraud, including phishing, and offers strategies for detecting and preventing fraudulent activities within organizations.
- Social Engineering: The Art of Human Hacking" by Christopher Hadnagy - While primarily focusing on social engineering techniques, this book covers phishing as one of the key tactics used by malicious actors to exploit human vulnerabilities.