Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Phishing Attack

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
It is a kind of Internet based fraud that trying to acquire a client’s credentials. It includes stealing of passwords, bank account details, credit card numbers and other secret information related to client. Phishing attacks are more popular in its exploitation of social engineering techniques. These are the exactly information, which a phishers actually wants.
Published in Chapter:
Security Architecture for Cloud Computing
Robin Singh Bhadoria (Indian Institute of Technology Indore, India)
DOI: 10.4018/978-1-4666-6559-0.ch003
Abstract
Clouds need to address three security issues: confidentiality, integrity, and availability. Security architecture for cloud computing is designed based on the functional architecture. The approach is to enhance the components of a functional architecture with additional components providing various security services. This is an extension of SaaS concept to have several security components that are common to all application and services. Various cloud security issues are discussed in this chapter.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
An Overview of Threats to Information Security
Attacks that use deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR