COMPARATIVE ANALYSIS OF PHISHING ATTACKS AND OTHER CYBERATTACK TYPES
{$ Etel}:
phishing, types, attack, whaling, smishing, vishing, spear phishingAbstrak
In recent years, the rapid development of information technology has been accompanied by a surge in cybersecurity issues. Among the various cyberattack methods, phishing stands out as one of the most common and deceptive techniques. Unlike many technical attacks, phishing relies heavily on human psychology and user inattention. This paper presents a detailed overview of phishing attacks and compares them with other prevalent forms of cyberattacks.
Bibliografik havolalar
1. Gupta, B., & Shukla, A. (2020). Phishing and Social Engineering Attacks: Strategies and Techniques. CRC Press. A comprehensive overview of phishing strategies and how social engineering is used to exploit users.
2. Hutchins, R., & Alenezi, M. (2021). Cybersecurity Awareness and the Role of Education in Preventing Phishing, Journal of Cybersecurity Education, Research and Practice, 2021(1), Article 3.
3. Huang, Y., & Bashir, M. (2021). Impact of User Training on Phishing Susceptibility: A MetaAnalysis. ACM Transactions on Privacy and Security (TOPS), 24(4), 1–28.
4. Tariq, M. U., et al. (2022). Phishing Attacks: Recent Trends and Challenges. Journal of Information Security and Applications, 65, 103133. https://doi.org/10.1016/j.jisa.2022.103133
5. Jakobsson, M., & Liao, Q. V. (2022). Deception by Design: The Rise of Phishing as a Threat to Usability. IEEE Security & Privacy, 20(2), 44–51.
6. Stallings, William, “Computer Security: Principles and Practice”, Pearson, 4th Edition, 2018.
7. Whitman, Michael E., and Herbert J. Mattord, “Principles of Information Security”, Cengage Learning, 6th Edition, 2017.
8. Jagatic, Tom N., et al, “Social phishing”, Communications of the ACM, vol. 50, no. 10, 2007, pp. 94-100.
9. Hong, Jason, “The state of phishing attacks”, Communications of the ACM, vol. 55, no. 1, 2012, pp. 74-81.
10. Alazab, Mamoun, et al, “Cybercrime: The Case of Phishing”, 2013 IEEE TrustCom Conference.
Yuklamoq
Nashr qilingan
Nashr
Bo'lim
Guvohnoma
Kopiright (C) {$ Kopirigntda} {$ Kopirightholder}
" Litsenziyasi "HRTPS://creseekommons.org/licenseommons.org/licens.org/licens.org/licens.org/licens.org/LICS/4.0/"> Litsenziyalarni litsenziyalash "litsenziyalari Axtibatish "(" Attributi ") 4.0 World
. P>