Phishing Attacks: Preying on Human Psychology to Beat the System and Developing Cybersecurity Protections to Reduce the Risks
Abstract
The evolution of technology over the years has allowed people to more easily store, access, and share information on the Internet. People can bank online, shop, and post their latest life news. Unfortunately, all this available information has attracted the attention of cybercriminals who want to use this personal information for fraudulent purposes. A common technique used by cybercriminals to obtain sensitive information is a scam called phishing. Criminals pose as a trusted entity in order to trick victims into revealing sensitive information that they will later use to commit illegal money transfers, identity theft, or other fraud. The consequences of phishing scams may lead to the loss of data, money, identity, reputation, and trust. As a result, organizations and individuals need to familiarize themselves with the process of a phishing attack and how to protect their systems and information. Organizations and individuals not only need the proper hardware and software to protect their information, but they also need to understand that cybercriminals prey on human psychology. Cybercriminals often use social engineering tactics to persuade people to willingly share their personal information. Therefore, cybersecurity policies and security prevention tips should address technical elements, as well as human behavioral factors that use the CIA (Confidentiality, Integrity, and Availability) model as a guide.
Downloads
Published
Issue
Section
License
World Libraries allows authors to maintain the copyright of their article or to give permission to World Libraries to hold the copyright. If contributors decide to maintain copyright, a Creative Commons license allows authors to determine how their work can be used. For more information on the types of licenses available, visit http://www.creativecommons.org/.
Authors submitting a paper to World Libraries do so with the understanding that Internet publishing is both an opportunity and a challenge. In this environment, authors and publishers do not always have the means to protect against unauthorized copying or editing of copyright-protected works.
World Libraries is a copyrighted product, and all rights are reserved worldwide. Permissions to use any materials appearing in World Libraries should be directed to Questions about World Libraries.
Downloads of specific portions of World Libraries articles are permitted for personal use only, not for commercial use or resale. Educational uses of World Libraries are permitted with permission of the authors of specific works appearing in World Libraries.
PRIVACY
World Libraries respects the privacy of both its readers and its contributors. To that end, World Libraries does not collect in its logs or other server tools the exact identities of its readers. World Libraries does not require its readers to sign in or to secure a unique ID or password. World Libraries does not use cookies.
World Libraries collects general information in its logs on the origins of users at the highest domain levels. Usage patterns are tracked in World Libraries to assist editors in making decisions about future content. In addition, this information is used for research on usage patterns to improve the site over time.
E-mail addresses used by World Libraries to notify readers of new issues are not disclosed to third parties.