Critical Strategies for Phishing Defense and Digital Asset Protection: A Case Study Approach

Critical Strategies for Phishing Defense and Digital Asset Protection: A Case Study Approach

N. V. Keerthana (Velalar College of Engineering and Technology, India), P. Suresh (Vellore Institute of Technology, India), Madhumitha Kulandaivel (SRM University, India), and Sindhumitha Kulandaivel (National Institute of Technology, Tiruchirappalli, India)
Copyright: © 2025 |Pages: 24
DOI: 10.4018/979-8-3693-8784-9.ch011
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Phishing is still one of the most common and dangerous types of cyber threats, and it keeps getting more sophisticated. The increasing prevalence of phishing attempts has made it necessary for enterprises across the globe to prioritize the development of offensive and defensive cybersecurity solutions. This case study explores the current state of phishing and the developments in cyber protection tactics that have accompanied them, showcasing actual situations in which businesses have successfully reduced these risks. Phishing uses human psychology to trick people into disclosing private data, such as login passwords, bank account details, or other personal information. It frequently takes the form of official correspondence. A more advanced variation called spear-phishing is more difficult to identify and counter since it uses carefully constructed communications that are targeted at certain people or companies. More proactive threat identification and response are now possible thanks to the integration of AI and ML with conventional SIEM systems.
Chapter Preview

Complete Chapter List

Search this Book:
Reset