JETIREXPLORE- Search Thousands of research papers



Published in:

Volume 7 Issue 6
June-2020
eISSN: 2349-5162

Unique Identifier

JETIR2006493

Page Number

1093-1095

Share This Article


Title

Study Of Phishing Attack

ISSN

2349-5162

Cite This Article

"Study Of Phishing Attack", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 6, page no.1093-1095, June-2020, Available :http://www.jetir.org/papers/JETIR2006493.pdf

Abstract

The extensive use of internet has positive as well as negative sides to it. Cyber-attacks have become very popular these days as everything has gone online. Cyber-attack is an attack made by cyber-criminals on internet users. Cyber-attacks consist of a number of attacks like denial-of-service attacks, ransomware, MITM, phishing, etc. Phishing consists of the hacker pretending to be someone who he is not and trying to gather personal information and credentials from potential victims. Phishing is venerable, but increasingly sophisticated form of cyber-attacks. With general precautionary measures these attacks can also be prevented.

Key Words

Phishing, fraudulent emails, phishing kits, clone websites.

Cite This Article

"Study Of Phishing Attack", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 6, page no. pp1093-1095, June-2020, Available at : http://www.jetir.org/papers/JETIR2006493.pdf

Publication Details

Published Paper ID: JETIR2006493
Registration ID: 234282
Published In: Volume 7 | Issue 6 | Year June-2020
DOI (Digital Object Identifier):
Page No: 1093-1095
ISSN Number: 2349-5162

Download Paper

Preview Article

Download Paper




Cite This Article

"Study Of Phishing Attack", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 6, page no. pp1093-1095, June-2020, Available at : http://www.jetir.org/papers/JETIR2006493.pdf




Preview This Article


Downlaod

Click here for Article Preview