COMPARATIVE ANALYSIS OF PHISHING ATTACKS AND OTHER CYBERATTACK TYPES

Авторы

  • Akbarjon Kodirov Автор

Ключевые слова:

phishing, types, attack, whaling, smishing, vishing, spear phishing

Аннотация

 In recent years, the rapid development of information technology has been accompanied by a surge in cybersecurity issues. Among the various cyberattack methods, phishing stands out as one of the most common and deceptive techniques. Unlike many technical attacks, phishing relies heavily on human psychology and user inattention. This paper presents a detailed overview of phishing attacks and compares them with other prevalent forms of cyberattacks. 

Биография автора

  • Akbarjon Kodirov

    Student of Academic Lyceum named after S.H. Sirojidinov

Библиографические ссылки

1. Gupta, B., & Shukla, A. (2020). Phishing and Social Engineering Attacks: Strategies and Techniques. CRC Press. A comprehensive overview of phishing strategies and how social engineering is used to exploit users.

2. Hutchins, R., & Alenezi, M. (2021). Cybersecurity Awareness and the Role of Education in Preventing Phishing, Journal of Cybersecurity Education, Research and Practice, 2021(1), Article 3.

3. Huang, Y., & Bashir, M. (2021). Impact of User Training on Phishing Susceptibility: A MetaAnalysis. ACM Transactions on Privacy and Security (TOPS), 24(4), 1–28.

4. Tariq, M. U., et al. (2022). Phishing Attacks: Recent Trends and Challenges. Journal of Information Security and Applications, 65, 103133. https://doi.org/10.1016/j.jisa.2022.103133

5. Jakobsson, M., & Liao, Q. V. (2022). Deception by Design: The Rise of Phishing as a Threat to Usability. IEEE Security & Privacy, 20(2), 44–51.

6. Stallings, William, “Computer Security: Principles and Practice”, Pearson, 4th Edition, 2018.

7. Whitman, Michael E., and Herbert J. Mattord, “Principles of Information Security”, Cengage Learning, 6th Edition, 2017.

8. Jagatic, Tom N., et al, “Social phishing”, Communications of the ACM, vol. 50, no. 10, 2007, pp. 94-100.

9. Hong, Jason, “The state of phishing attacks”, Communications of the ACM, vol. 55, no. 1, 2012, pp. 74-81.

10. Alazab, Mamoun, et al, “Cybercrime: The Case of Phishing”, 2013 IEEE TrustCom Conference.

Опубликован

2025-04-28

Выпуск

Раздел

Технические науки

Как цитировать

COMPARATIVE ANALYSIS OF PHISHING ATTACKS AND OTHER CYBERATTACK TYPES. (2025). МЕЖДУНАРОДНЫЙ НАУЧНО-ЭЛЕКТРОННЫЙ ЖУРНАЛ “ПЕРЕДОВЫЕ ИССЛЕДОВАНИЯ И ТЕОРИИ”, 1(5). https://pstjournal.uz/index.php/pst/article/view/45