Revolutionizing Education with AI: Recent Developments and Future Directions



EOI: 10.11242/viva-tech.01.05.001

Download Full Text here



Citation

Chandani Patel,Tejas Nikam,"PHISHING TECHNOLOGY", VIVA-IJRI Volume 1, Issue 7, Article 1, pp. 1-5, 2024. Published by Master of Computer Application Department, VIVA Institute of Technology, Virar, India.

Abstract

Phishing attacks, social engineering, Cybersecurity threats, Email phishing, Website spoofing

References

  1. "Phishing Exposed" by Lance James, Steven Adair, and Blake Darché - This book provides insights into the techniques used by hackers in phishing attacks and offers strategies for defending against them.
  2. "The Art of Deception: Controlling the Human Element of Security" by Kevin D. Mitnick and William L. Simon - Although not solely focused on phishing, this book explores various methods of social engineering, including phishing, and how individuals can be manipulated into divulging sensitive information.
  3. ]"Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails" by Christopher Hadnagy and Michele Fincher - This book delves into the psychology behind phishing attacks and provides guidance on both defending against them and conducting ethical phishing tests for organizational security.
  4. Countering Fraud for Competitive Advantage: The Professional Approach to Reducing the Last Great Hidden Cost" by Peter Goldmann - This book discusses various types of fraud, including phishing, and offers strategies for detecting and preventing fraudulent activities within organizations.
  5. Social Engineering: The Art of Human Hacking" by Christopher Hadnagy - While primarily focusing on social engineering techniques, this book covers phishing as one of the key tactics used by malicious actors to exploit human vulnerabilities.