Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Phishing

Handbook of Research on Information Security and Assurance
The art of trying to gain sensitive information through impersonating a legitimate organization and individual interacts with.
Published in Chapter:
Guarding Corporate Data from Social Engineering Attacks
Christopher M. Botelho (Baylor Health, USA) and Joseph A. Cazier (Appalachian State University, USA)
Copyright: © 2009 |Pages: 10
DOI: 10.4018/978-1-59904-855-0.ch037
Abstract
The threat of social engineering attacks is prevalent in today’s society. Even with the pervasiveness of mass media’s coverage of hackers and security intrusions, the general population is not aware of the possible damage that could occur should they be subjected to a social engineering attack. In order to show the damage caused by these attacks, we will discuss the results of a social engineering attack based on a survey conducted in the downtown area of a large financial center in the United States. The authors make suggestions companies can incorporate into their policies in order to protect their employees, as well as systems from intrusions based on social engineering attacks.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Benefits of Information Security Awareness Training Against Phishing Attacks: A Field Study
A type of social engineering in which an attacker sends a fraudulent message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's computer or mobile device.
Full Text Chapter Download: US $37.50 Add to Cart
E-Banking Frauds: The Current Scenario and Security Techniques
It is a deceiving technique which involves social engineering (that refers to psychological manipulation of people into performing actions or divulging confidential information) and technical subterfuge.
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues of Smartphones Regarding M-Commerce
Trying to obtain sensitive information (usernames, passwords and credit card information) by masquerading as a trusted party in an electronic communication.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
A deceptive normally online attempt by an attacker to obtain user’s confidential information for financial gain.
Full Text Chapter Download: US $37.50 Add to Cart
Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents
This is a specific attack, where the attacker sends a malicious e-mail, containing a malicious program embedded or a link to a site hosting the malicious program. Usually, this e-mail has a very curious content, trying to entice the reader to click or open the file.
Full Text Chapter Download: US $37.50 Add to Cart
Social Engineering and Data Privacy
Sending email to someone, pretending as reputable company, alluring him to disclose their personal information such as their keys, password or other personal information
Full Text Chapter Download: US $37.50 Add to Cart
New Generation Mobile Cyber Security Threats: QR Codes and Social Engineering Threats
It is a type of online attack in which scammers send emails to random user accounts. E-mails are sent by pretending to be known internet pages or the user's bank account, internet service provider.
Full Text Chapter Download: US $37.50 Add to Cart
Cryptocurrency: A Detailed Study
An attacker sends a fake mail aiming to trick the victim into exposing confidential information for the attacker.
Full Text Chapter Download: US $37.50 Add to Cart
Ransomware: A New Cyber Hijacking Threat to Enterprises
A type of fraud whereby a criminal attempts to trick their victim into accepting a false identity presented by the criminal. The common application of this approach is to send fake e-mails to a victim purporting to come from a legitimate source and requesting information or directing the victim to a fake Internet website where this information can be captured.
Full Text Chapter Download: US $37.50 Add to Cart
An Analysis of Industry 4.0
Use of emails to entice users to either open an attachment containing embedded malicious code or ‘click on a link’ representing a URL of a server under an attacker’s control that can land malware onto the victim’s client. Spear phishing is the targeted distribution of spoof emails to a target audience.
Full Text Chapter Download: US $37.50 Add to Cart
The Vulnerability of Children in Cyberspace
This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer. Cybercriminals are becoming more established and many of these emails are not flagged as spam. Users are tricked into emails claiming they need to change their password or update their billing information, giving criminals access.
Full Text Chapter Download: US $37.50 Add to Cart
Emerging Cybercrime Variants in the Socio-Technical Space
A scam using fraudulent emails and websites to steal personal information for financial gain.
Full Text Chapter Download: US $37.50 Add to Cart
Trustworthy Computing
Stealing from users their confidential data (like logins and passwords) by deceptive alert email messages and Web sites.
Full Text Chapter Download: US $37.50 Add to Cart
Social Engineering and its Countermeasures
Using fraudulent emails to direct users to websites that mimic valid websites in order to obtain private information.
Full Text Chapter Download: US $37.50 Add to Cart
Identity Theft through the Web
A two-stage attack enticing victims to submit their personal information to a fake web site.
Full Text Chapter Download: US $37.50 Add to Cart
The Advancing Cybersecurity Ecosystem of Israel: An Overview of Current Challenges and Opportunities in the Early 2020s
A phishing website is a site that presents itself as the official site of a known organization or company and attempts to obtain personal information, typically user IDs, passwords, and credit card information. Scammers often try to get users to click on the link in the message, which leads them to a phishing page by sending unsolicited emails and instant messages. If users follow the instructions there, they can become victims.
Full Text Chapter Download: US $37.50 Add to Cart
Use of Social Media for Policing
Phishing is a type of e-mail fraud in which a perpetrator attempts to acquire sensitive information (such as bank financial pin) for malicious reasons.
Full Text Chapter Download: US $37.50 Add to Cart
Taxonomy of Login Attacks in Web Applications and Their Security Techniques Using Behavioral Biometrics
It is a type of extortion where false messages are sent that look like messages from respectable sources.
Full Text Chapter Download: US $37.50 Add to Cart
Detection and Prevention of Fraud in the Digital Era
Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients” (definition provided by Search Security, as cited in Ross, 2016). Malware emails can be used for phishing (Pickett, 2012). Phishing does not only targets customers or clients, it also targets.
Full Text Chapter Download: US $37.50 Add to Cart
A Routine Activity Theory-Based Framework for Combating Cybercrime
An attempt to acquire personal information by impersonating as a trustworthy entity in an electronic communication.
Full Text Chapter Download: US $37.50 Add to Cart
Security Policy Issues in Internet Banking in Malaysia
A type of identity theft where criminals blast emails to a mass audience in their malicious attempt to bait you into fake websites or also knows as ‘online identity fraud’.
Full Text Chapter Download: US $37.50 Add to Cart
Artificial Intelligence Applications in Cybersecurity
This is a malicious activity where attackers send emails that look legitimate to lure individuals to give out their sensitive personal details.
Full Text Chapter Download: US $37.50 Add to Cart
The Insider Threat Landscape and the FinTech Sector: Attacks, Defenses, and Emerging Challenges
Fake communication that pretends to be from a legitimate source and intends to trick the receivers into divulging private information (e.g., a fake email pretending to be from a bank, intended to trick bank customers into sharing their online banking credentials).
Full Text Chapter Download: US $37.50 Add to Cart
Potential Threats of Social Engineering Practices to Social Work: Concepts, Challenges, and Solutions
It is a fraudulent attempt to gain sensitive information or data by impersonating oneself as a trustworthy entity in digital communications.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber-Victimization
Phishing refers to the use of emails and websites to ‘fish’ for personal information such as credit card numbers, back account information and passwords to use for fraudulent purposes.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Awareness Among Postgraduate Students: A Study of Mangalore University
The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers.
Full Text Chapter Download: US $37.50 Add to Cart
The Anatomy of Phishing Attacks and the Detection and Prevention of Fake Domain Names
It is a kind of fraudulent attempt to obtain confidential data or sensitive information by impersonating oneself as a trustworthy entity in digital communications.
Full Text Chapter Download: US $37.50 Add to Cart
The Age of Ransomware: Understanding Ransomware and Its Countermeasures.
A technique used by hackers to obtain confidential information from victims by sending illegitimate emails that look legitimate.
Full Text Chapter Download: US $37.50 Add to Cart
Online Privacy Issues
A form of spoofing, where users are tricked into providing personal identification information because thieves have stolen the “look and feel” of a legitimate site.
Full Text Chapter Download: US $37.50 Add to Cart
Social Engineering in Information Security Breaches and the Factors That Explain Its Success: An Organizational Perspective
A technology-based social engineering attack that relies on appealing to human vulnerability factors via the dissemination of deceptive emails which lead users to clicking on malicious links and/or sharing sensitive information on fraudulent websites.
Full Text Chapter Download: US $37.50 Add to Cart
Hacking: Evolution, Conceptualization, and the Perpetrators
Form of cyberattack that, usually through messages or emails, seeks to trick people into giving up sensitive information or installing harmful software ( Curtis et al . , 2018 ).
Full Text Chapter Download: US $37.50 Add to Cart
Can Total Quality Management Exist in Cyber Security: Is It Present? Are We Safe?
This is a type of electronic mail attack that attempts to convince the user that the originator is genuine, but with the intention of obtaining information for use in social engineering.
Full Text Chapter Download: US $37.50 Add to Cart
Honeypots and Honeynets: Analysis and Case Study
Kind of cybercrime committed through social engineering with the intention of obtaining confidential information like passwords or PINs.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Apps Threats
Phishing as “a type of attack that communicates socially engineered messages to humans via electronic communication channels in order to persuade them to perform certain actions for the attacker’s benefit” ( Bottazzi et al., 2015 ).
Full Text Chapter Download: US $37.50 Add to Cart
Combating Computer Fraud
An activity based upon social engineering, where perpetuators or phishers attempt to exploit the trustworthiness of individuals to reveal personal information, such as user name, passwords, credit card numbers, banking information, and so forth. Communications is attempted by several means - e-mail, phone, letters - but most often carried out by e-mail due to the ease and relative ease in which phishers can obtain mailing lists with thousands of e-mail addresses. Phishing techniques are varied and often very business looking stating that your financial institution needs you to update your records immediately or your account will be locked. Phishers do not really know your banking institution, but after they send out 10,000 e-mails, the chances are good that some of those e-mail addresses actually conduct business with the named institution in the e-mail. It is the unsuspected individual who does not identify this as such, and instead of calling his or her financial institution, offers their valuable information, often at a Web site that looks identical to their main institution.
Full Text Chapter Download: US $37.50 Add to Cart
The Ethics of Deception in Cyberspace
A deception involving email as bait to get victims to go to a Web site where their personal information can be stolen.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Identity Theft
Phishing refers to the use of emails and websites to ‘fish’ for personal information such as credit card numbers, back account information and passwords to use for fraudulent purposes.
Full Text Chapter Download: US $37.50 Add to Cart
Internet Privacy
An attempt to obtain a user’s sensitive data through the use of a fraudulent identity via electronic communication.
Full Text Chapter Download: US $37.50 Add to Cart
Cyberwar: Its Psychological Impact on Employees and Consequences for Organizations
Phishing is an effort to get sensitive information such as login, password, credit card data, pin code, account number, or unique id by impersonating a trustworthy institution.
Full Text Chapter Download: US $37.50 Add to Cart
“Attention Beneficiary…!”: Assessing Types and Features of Scam Emails
A cybercrime in which someone is contacted by email or phone by someone who disguises as a trustworthy entity and tries to gain their confidence in an attempt to obtain sensitive information from them such as usernames, passwords and credit card details in order to defraud them.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Crime Regulation, Challenges, and Response
Is defined as the method of cyberattack which are employed to capture the sensitive information including passwords, personal information for the malicious purpose through means such as deceptive emails.
Full Text Chapter Download: US $37.50 Add to Cart
Understanding Computer Security
An activity based upon social engineering, where perpetuators or phishers attempt to exploit the trustworthiness of individuals to reveal personal information, such as user name, passwords, credit card numbers, banking information, and so forth. Communications are attempted by several means - e-mail, phone, letters - but most often carried out by e-mail due to the ease and relative ease in which phishers can obtain mailing lists with thousands of e-mail addresses. Phishing techniques are varied and often very business looking stating that your financial institution needs you to update your records immediately or your account will be locked. Phishers do not really know your banking institution, but after they send out 10,000 e-mails, the chances are good that some of those e-mail addresses actually conduct business with the named institution in the e-mail. It is the unsuspected individual who does not identify this as such, and instead of calling his or her financial institution, offers their valuable information, often at a Web site that looks identical to their main institution.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Security Strategy
A form of cyberattack that aims at obtaining sensitive information (e.g., usernames, passwords, credit card numbers) by the impersonation of trustworthy entities.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Identity and Data Sovereignty: Redefining Global Information Flows
Phishing is a fraudulent attempt to obtain sensitive information, such as login credentials, by posing as a trustworthy entity in electronic communication.
Full Text Chapter Download: US $37.50 Add to Cart
E-Technology Challenges to Information Privacy
A user’s e-mail program is used to direct the user to a legitimate-looking Web site where the user is asked to provide personal information about himself or herself such as passwords and account numbers.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Terrorism Attack: Types, Effects, and Prevention
The process of sending emails or messages pretending to be another person who results in getting personal data from others such as credit card number or phone number.
Full Text Chapter Download: US $37.50 Add to Cart
Designing Antiphishing Education
The use of social engineering in e-mails for the purpose of deceiving the recipient into either compromising sensitive information or following a set of instructions that leads to a security breach.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Management
Fraudulent representation of an organization as sender.
Full Text Chapter Download: US $37.50 Add to Cart
A Multistage Framework to Defend Against Phishing Attacks
Phishing is a form of Web based identity theft where attackers employ deceit and social engineering to defraud users of their private and confidential information such as password, credit card number, social security number (SSN), and bank account number.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Forensics and Data Mining
Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR