Phishing Technology And Its Effect To The Frauds

Read Complete Research Material

Phishing technology and its effect to the frauds



I would like to thank Stillianos Vidalis for the support and guidance given throughout this project and the entirety of my study. I would also like to thank Andrew Bellamy for his support, advice, encouragement and humour during the last few years- thank you for continuously making me smile! Finally, many thanks to the rest of the academic staff who have also supported me throughout my course, your help and advice will always be appreciated.

Signature: _______________________________

Date: __________________________


I, [name of the author], hereby declare the best of my knowledge, the entire contents of this thesis represent my real job, and that such a thesis was submitted prior to any academic research or other qualifications. In addition, he represents his own personal opinions and do not have anything to do with them at university.

Signed: __________________. Date: _________________.


Phishing attack is the criminally fraudulent procedure of attempting to acquire sensitive information such as usernames, credit card details and passwords by masquerading as a truthful entity in the online activity. Phishing is a deceitful email that attempts to get you to disclose personal information that is able to be used for criminal purposes. There are various differences on this method. It is probably to Phish for other sensitive data in additions to user names and passwords such as national insurance numbers, credit card numbers, bank account numbers and mother's maiden names. Phishing attack presents direct risks throughout the make use of the stolen credentials and indirect risk to institutions that carry out business on line throughout reducing of customer confidence. The destruction caused by the Phishing attack ranges from denial of accessing to email to extensive financial loss. In this report I will also concerned with anti Phishing techniques. There are some different techniques to fighting Phishing attack, plus legislation and technology created specially to defend against Phishing. Anti Phishing software and computer programs are planned to avoid the amount of Phishing and trespass on user's confidential information. Anti Phishing software is considered to follow web sites and monitor actions any mistrustful behaviour can be mechanically reported, includes how discovering Phishing attacks, how to avoid and keep away from being scammed, how to counter when you expect or disclose a Phishing attack and what you can do to help stopping this attack.






1.1 Aim2

1.2 Delimitations2

1.3 Research Question3

1.4 Refined Set of Research Questions3

1.5 hypotheses Outline and Writing Conventions4


2. What is phishing5

2.2Why phishing work7

2.3 Phishing process7

2.3.1 The Phish”lure”8

2.3.2 The Bite9

2.3.3 The Catch9

2.4 Spear phishing10

2.4.1 How do Spear Phishing Attacks Work?10

2.4.2 How to Prevent Spear Phishing Attacks11


Figure 1 APWG Report13

Table1 shows decrease has occurred despite a continuing rise in phishing attacks, up to 21% from 200914

2-Anatomy to Email Spam14

3-Examination of a phishing message15

Figure 2 shows phishing email structure16

4-Email Headers16

5-Email Content:17

5-1- Contents cover is designed17

Figure 3 shows phishing Email example18

6-Examination of Phishing Website19

Figure 4 shows paypal FAKE website20

Figure 5 shows MSN Credential phishing via a SCAM20

7-Anti phishing goals and Techniques solutions21

This approaches used ...
Related Ads
  • Phishing

    Phishing Phishing Introduction Digital technologies ...

  • Effect Of Phishing On Ind...

    The main focus of the research is on "Identity Theft ...

  • Technology: New Crimes

    Technology : New Crimes, Technology : Ne ...

  • Phishing

    Phishing Phishing Introduction Internet fraud includ ...

  • Human Computer Interaction

    It's provided people a chance for busines ...