COMPARATIVE ANALYSIS OF PHISHING ATTACKS AND OTHER CYBERATTACK TYPES
Keywords:
phishing, types, attack, whaling, smishing, vishing, spear phishingAbstract
In recent years, the rapid development of information technology has been accompanied by a surge in cybersecurity issues. Among the various cyberattack methods, phishing stands out as one of the most common and deceptive techniques. Unlike many technical attacks, phishing relies heavily on human psychology and user inattention. This paper presents a detailed overview of phishing attacks and compares them with other prevalent forms of cyberattacks.
References
1. Gupta, B., & Shukla, A. (2020). Phishing and Social Engineering Attacks: Strategies and Techniques. CRC Press. A comprehensive overview of phishing strategies and how social engineering is used to exploit users.
2. Hutchins, R., & Alenezi, M. (2021). Cybersecurity Awareness and the Role of Education in Preventing Phishing, Journal of Cybersecurity Education, Research and Practice, 2021(1), Article 3.
3. Huang, Y., & Bashir, M. (2021). Impact of User Training on Phishing Susceptibility: A MetaAnalysis. ACM Transactions on Privacy and Security (TOPS), 24(4), 1–28.
4. Tariq, M. U., et al. (2022). Phishing Attacks: Recent Trends and Challenges. Journal of Information Security and Applications, 65, 103133. https://doi.org/10.1016/j.jisa.2022.103133
5. Jakobsson, M., & Liao, Q. V. (2022). Deception by Design: The Rise of Phishing as a Threat to Usability. IEEE Security & Privacy, 20(2), 44–51.
6. Stallings, William, “Computer Security: Principles and Practice”, Pearson, 4th Edition, 2018.
7. Whitman, Michael E., and Herbert J. Mattord, “Principles of Information Security”, Cengage Learning, 6th Edition, 2017.
8. Jagatic, Tom N., et al, “Social phishing”, Communications of the ACM, vol. 50, no. 10, 2007, pp. 94-100.
9. Hong, Jason, “The state of phishing attacks”, Communications of the ACM, vol. 55, no. 1, 2012, pp. 74-81.
10. Alazab, Mamoun, et al, “Cybercrime: The Case of Phishing”, 2013 IEEE TrustCom Conference.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Kodirov Akbarjon (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.