Phishing Attacks and Countermeasures: Implications for Enterprise Information Security

Phishing Attacks and Countermeasures: Implications for Enterprise Information Security

Bogdan Hoanca (University of Alaska Anchorage, USA)
Copyright: © 2007 |Pages: 18
DOI: 10.4018/978-1-59904-090-5.ch012
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

The field of information security has realized many advances in the past few decades. Some of these innovations include new cryptographic techniques, network protocols, and hardware tokens. However, the weakest link in information security systems, human gullibility, remains extremely vulnerable. Even the strongest cryptographic algorithms are useless if a user is fooled into disclosing their authentication information. This chapter describes the threat of phishing in which attackers generally sent a fraudulent e-mail to their victims in an attempt to trick them into revealing private information. We start by defining the phishing threat and its impact on the financial industry. Next, we review different types of hardware and software attacks and their countermeasures. Finally, we discuss policies that can protect an organization against phishing attacks. An understanding of how phishers elicit confidential information along with technology and policy-based countermeasures will empower managers and end users to better protect their information systems.

Complete Chapter List

Search this Book:
Reset