Phishing Attacks Narrative Essay by Writing Specialists

Phishing Attacks
This paper discusses phishing attacks which use various methods via the Internet, to steal consumers' personal identity data and financial account credentials.
# 92463 | 2,536 words | 12 sources | MLA | 2007 | US


$19.95 Buy and instantly download this paper now

Description:

In this article, the writer enters the world of information technology and examines phishing attacks, that are also known as carding and spoofing. The writer notes the convenience and freedom of the technologies demonstrated by the existence of the Internet. However, the writer then points out the drawback that is the prevalence of malicious codes and mischievous deeds propagated by those seeking "fame and glory" and worst, trying to gain financially despite the illicit acts committed. The writer concludes that in spite of all the negative effects brought about by malicious codes, spam, phishing and pharming, the Internet is still a worthwhile technology, and everyone should be cognizant of the fact that protection of this technology should be maintained. The writer notes that by learning about the different methods and techniques involved in propagating malicious codes and other related vectors, mitigation of the threats and risks these have will be achieved.

Table of Contents:
What is Phishing?
Phishing Techniques
History of Phishing
Using Misspelled URLS and Sub-Domains in Phishing
Cross-Site Scripting
Case Studies on Phishing
Protection against Phishing
Conclusion
Bibliography

From the Paper:

"It has been said time and again that the personal computer and the Internet brought wonderful technologies at the touch of a button. The convenience of e-mails, e-commerce and Google searches gave everyone access to "anything and everything" and the freedom of getting information "anytime and anywhere." The drawback though is the prevalence of malicious codes and mischievous deeds propagated by those seeking "fame and glory" and worst, trying to gain financially despite the illicit acts committed.
Malicious codes such as viruses, Trojan horses, logic bombs, worms, etc. inundated the Internet since inception. Then came the hackers, whackers and spammers who made surfing the Net difficult by threatening the online services."

Sample of Sources Used:

  • Anti-Phishing Working Group (APWG). (2006). What is phishing and pharming? Retrieved August 3, 2006 from the Website: http://www.antiphishing.org/
  • Criminal Division, U.S. Department of Justice. (2005). Special report on "phishing". Retrieved August 3, 2006 from the Website: www.usdoj.gov/criminal/fraud/Phishing.pdf.
  • Dhamija, Rachna, Tygar, J. D. and Hearst, Marti. (2006, April 22-27). Why phishing works. Retrieved August 3, 2006 from the Website: http://people.deas.harvard.edu/~rachna/papers/why_phishing_works.pdf.
  • Faas, David. (2005, August 26). Word of the day: phishing. InfoPackets Windows Newsletter. Retrieved August 3, 2006 from the Website: http://www.infopackets.com/channels/en/pause_for_thought/word_of_the_day/2005/20050826_phishing.htm
  • The Honeynet Project and Research Alliance. (2005, May 16). Know your enemy: phishing. Behind the Scenes of Phishing Attacks. Retrieved August 3, 2006 from the Website: http://www.honeynet.org/papers/phishing/.

Cite this Narrative Essay:

APA Format

Phishing Attacks (2007, February 21) Retrieved April 20, 2021, from https://www.academon.com/narrative-essay/phishing-attacks-92463/

MLA Format

"Phishing Attacks" 21 February 2007. Web. 20 April. 2021. <https://www.academon.com/narrative-essay/phishing-attacks-92463/>

Comments