×
10% Discount on All E-Books through IGI Global’s Online Bookstore Extended
(10% discount on all e-books cannot be combined with most offers. Discount is valid on purchases made directly through IGI Global Online Bookstore (
www.igi-global.com
)
and may not be utilized by booksellers and distributors. Offer does not apply to e-Collections and exclusions of select titles may apply. Offer expires December 31, 2022.)
Browse Titles
Login/Create Account
Language:
English
US
China
Cart
0
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
10% Discount on All E-Books through IGI Global’s Online Bookstore
With the continued paper shortages and supply chain issues, we have been informed by our partners that there will be substantial delays in printing and shipping publications, especially as we approach the holiday season. To help incentive the electronic format and streamline access to the latest research, we are offering a 10% discount on all our e-books through IGI Global’s Online Bookstore. Hosted on the InfoSci
®
platform, these titles feature no DRM, no additional cost for multi-user licensing, no embargo of content, full-text PDF & HTML format, and more.
Browse Titles
IGI Global to Convert an Additional 30 Journals to Full Gold Open Access for the 2022 Volume Year
IGI Global is to convert an additional 30 journals to full gold open access (OA) for their 2022 volume year, which will expand their OA collection to contain 60 gold open access and one (1) platinum open access journal.
Learn More
All IGI Global Scholarly Journals Shift to "Digital Preferred" Format
In response to the overwhelming demand for electronic content coupled with the mission to decrease the overall environmental impacts of print production and distribution, all IGI Global journals will shift into a digital preferred model for the 2022 volume year. Under this model, journals will become primarily available under electronic format and articles will be immediately available upon acceptance. Print subscriptions and print + electronic subscriptions will still be available, but for the print version, all articles that are published during the volume year will become available at the end of the year in a single (1) printed volume.
Learn More
IGI Global’s New DEI e-Book Collection
Acquire Over 320+ E-Books on Diversity, Equity, and Inclusivity from a publisher that has been dedicated to DEI since its inception over 30 years ago. Now, benefit from a collection of all of our DEI e-Books at a 90% Discount.
Learn More
Offering a
5% Pre-Publication Discount
on
All Reference Books Ordered Through IGI Global’s Online Bookstore*
To support customers with accessing the latest research, IGI Global is offering a 5% pre-publication discount on all hardcover, softcover, e-books, and hardcover + e-books titles.
*5% discount offer is eligible on hardcover, softcover, e-books, and hardcover + e-books titles and is automatically applied directly to the shopping cart. Discount offer only valid on purchases made directly through IGI Global’s Online Bookstore and offer expires 30 days after the publication’s release. This automatic discount is not intended for use by book distributors or wholesalers.
Browse Titles
Books
Books
Open Access Books
OnDemand Book Chapters
Journals
Journals
Open Access Journals
OnDemand Journal Articles
e-Collections
e-Collections
Transformative Open Access (Read & Publish)
Open Access
Publish
with Us
Resources
Librarians
e-Collections
Book Title List
Journal Title List
Video Title List
Library Collection Development Service
Browse Forthcoming Books
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Open Access Initiative
Instructors
Course Adoption
Teaching Cases
K-12 Online Learning Collection
Researchers
Browse Books
Browse Journals
Browse Forthcoming Books
Search Open Access Content
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
COPE Membership
Fair Use Policy
Open Access Publishing
Author Services
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Browse Forthcoming Books
Catalogs
About Us
Newsroom
What is Phishing
1.
The art of trying to gain sensitive information through impersonating a legitimate organization and individual interacts with.
Learn more in: Guarding Corporate Data from Social Engineering Attacks
2.
It is a deceiving technique which involves social engineering (that refers to psychological manipulation of people into performing actions or divulging confidential information) and technical subterfuge.
Learn more in: E-Banking Frauds: The Current Scenario and Security Techniques
3.
Trying to obtain sensitive information (usernames, passwords and credit card information) by masquerading as a trusted party in an electronic communication.
Learn more in: Security Issues of Smartphones Regarding M-Commerce
4.
A deceptive normally online attempt by an attacker to obtain user’s confidential information for financial gain.
Learn more in: Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
5.
This is a specific attack, where the attacker sends a malicious e-mail, containing a malicious program embedded or a link to a site hosting the malicious program. Usually, this e-mail has a very curious content, trying to entice the reader to click or open the file.
Learn more in: Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents
6.
An attacker sends a fake mail aiming to trick the victim into exposing confidential information for the attacker.
Learn more in: Cryptocurrency: A Detailed Study
7.
A type of fraud whereby a criminal attempts to trick their victim into accepting a false identity presented by the criminal. The common application of this approach is to send fake e-mails to a victim purporting to come from a legitimate source and requesting information or directing the victim to a fake Internet website where this information can be captured.
Learn more in: Ransomware: A New Cyber Hijacking Threat to Enterprises
8.
Use of emails to entice users to either open an attachment containing embedded malicious code or ‘click on a link’ representing a URL of a server under an attacker’s control that can land malware onto the victim’s client. Spear
phishing
is the targeted distribution of spoof emails to a target audience.
Learn more in: An Analysis of Industry 4.0
9.
This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer. Cybercriminals are becoming more established and many of these emails are not flagged as spam. Users are tricked into emails claiming they need to change their password or update their billing information, giving criminals access.
Learn more in: The Vulnerability of Children in Cyberspace
10.
A scam using fraudulent emails and websites to steal personal information for financial gain.
Learn more in: Emerging Cybercrime Variants in the Socio-Technical Space
11.
Stealing from users their confidential data (like logins and passwords) by deceptive alert email messages and Web sites.
Learn more in: Trustworthy Computing
12.
Using fraudulent emails to direct users to websites that mimic valid websites in order to obtain private information.
Learn more in: Social Engineering and its Countermeasures
13.
A two-stage attack enticing victims to submit their personal information to a fake web site.
Learn more in: Identity Theft through the Web
14.
A
phishing
website is a site that presents itself as the official site of a known organization or company and attempts to obtain personal information, typically user IDs, passwords, and credit card information. Scammers often try to get users to click on the link in the message, which leads them to a
phishing
page by sending unsolicited emails and instant messages. If users follow the instructions there, they can become victims.
Learn more in: The Advancing Cybersecurity Ecosystem of Israel: An Overview of Current Challenges and Opportunities in the Early 2020s
15.
Phishing
is a type of e-mail fraud in which a perpetrator attempts to acquire sensitive information (such as bank financial pin) for malicious reasons.
Learn more in: Use of Social Media for Policing
16.
It is a type of extortion where false messages are sent that look like messages from respectable sources.
Learn more in: Taxonomy of Login Attacks in Web Applications and Their Security Techniques Using Behavioral Biometrics
17.
“
Phishing
is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients” (definition provided by Search Security, as cited in Ross, 2016). Malware emails can be used for
phishing
(Pickett, 2012).
Phishing
does not only targets customers or clients, it also targets.
Learn more in: Detection and Prevention of Fraud in the Digital Era
18.
An attempt to acquire personal information by impersonating as a trustworthy entity in an electronic communication.
Learn more in: A Routine Activity Theory-Based Framework for Combating Cybercrime
19.
A type of identity theft where criminals blast emails to a mass audience in their malicious attempt to bait you into fake websites or also knows as ‘online identity fraud’.
Learn more in: Security Policy Issues in Internet Banking in Malaysia
20.
It is a fraudulent attempt to gain sensitive information or data by impersonating oneself as a trustworthy entity in digital communications.
Learn more in: Potential Threats of Social Engineering Practices to Social Work: Concepts, Challenges, and Solutions
21.
Phishing
refers to the use of emails and websites to ‘fish’ for personal information such as credit card numbers, back account information and passwords to use for fraudulent purposes.
Learn more in: Cyber-Victimization
22.
It is a kind of fraudulent attempt to obtain confidential data or sensitive information by impersonating oneself as a trustworthy entity in digital communications.
Learn more in: The Anatomy of Phishing Attacks and the Detection and Prevention of Fake Domain Names
23.
A technique used by hackers to obtain confidential information from victims by sending illegitimate emails that look legitimate.
Learn more in: The Age of Ransomware: Understanding Ransomware and Its Countermeasures.
24.
A form of spoofing, where users are tricked into providing personal identification information because thieves have stolen the “look and feel” of a legitimate site.
Learn more in: Online Privacy Issues
25.
A technology-based social engineering attack that relies on appealing to human vulnerability factors via the dissemination of deceptive emails which lead users to clicking on malicious links and/or sharing sensitive information on fraudulent websites.
Learn more in: Social Engineering in Information Security Breaches and the Factors That Explain Its Success: An Organizational Perspective
26.
This is a type of electronic mail attack that attempts to convince the user that the originator is genuine, but with the intention of obtaining information for use in social engineering.
Learn more in: Can Total Quality Management Exist in Cyber Security: Is It Present? Are We Safe?
27.
Kind of cybercrime committed through social engineering with the intention of obtaining confidential information like passwords or PINs.
Learn more in: Honeypots and Honeynets: Analysis and Case Study
28.
Phishing
as “a type of attack that communicates socially engineered messages to humans via electronic communication channels in order to persuade them to perform certain actions for the attacker’s benefit” ( Bottazzi et al., 2015 ).
Learn more in: Mobile Apps Threats
29.
An activity based upon social engineering, where perpetuators or phishers attempt to exploit the trustworthiness of individuals to reveal personal information, such as user name, passwords, credit card numbers, banking information, and so forth. Communications is attempted by several means - e-mail, phone, letters - but most often carried out by e-mail due to the ease and relative ease in which phishers can obtain mailing lists with thousands of e-mail addresses.
Phishing
techniques are varied and often very business looking stating that your financial institution needs you to update your records immediately or your account will be locked. Phishers do not really know your banking institution, but after they send out 10,000 e-mails, the chances are good that some of those e-mail addresses actually conduct business with the named institution in the e-mail. It is the unsuspected individual who does not identify this as such, and instead of calling his or her financial institution, offers their valuable information, often at a Web site that looks identical to their main institution.
Learn more in: Combating Computer Fraud
30.
A deception involving email as bait to get victims to go to a Web site where their personal information can be stolen.
Learn more in: The Ethics of Deception in Cyberspace
31.
Phishing
refers to the use of emails and websites to ‘fish’ for personal information such as credit card numbers, back account information and passwords to use for fraudulent purposes.
Learn more in: Cyber Identity Theft
32.
An attempt to obtain a user’s sensitive data through the use of a fraudulent identity via electronic communication.
Learn more in: Internet Privacy
33.
A cybercrime in which someone is contacted by email or phone by someone who disguises as a trustworthy entity and tries to gain their confidence in an attempt to obtain sensitive information from them such as usernames, passwords and credit card details in order to defraud them.
Learn more in: “Attention Beneficiary…!”: Assessing Types and Features of Scam Emails
34.
Is defined as the method of cyberattack which are employed to capture the sensitive information including passwords, personal information for the malicious purpose through means such as deceptive emails.
Learn more in: Cyber Crime Regulation, Challenges, and Response
35.
An activity based upon social engineering, where perpetuators or phishers attempt to exploit the trustworthiness of individuals to reveal personal information, such as user name, passwords, credit card numbers, banking information, and so forth. Communications are attempted by several means - e-mail, phone, letters - but most often carried out by e-mail due to the ease and relative ease in which phishers can obtain mailing lists with thousands of e-mail addresses.
Phishing
techniques are varied and often very business looking stating that your financial institution needs you to update your records immediately or your account will be locked. Phishers do not really know your banking institution, but after they send out 10,000 e-mails, the chances are good that some of those e-mail addresses actually conduct business with the named institution in the e-mail. It is the unsuspected individual who does not identify this as such, and instead of calling his or her financial institution, offers their valuable information, often at a Web site that looks identical to their main institution.
Learn more in: Understanding Computer Security
36.
A form of cyberattack that aims at obtaining sensitive information (e.g., usernames, passwords, credit card numbers) by the impersonation of trustworthy entities.
Learn more in: Digital Security Strategy
37.
A user’s e-mail program is used to direct the user to a legitimate-looking Web site where the user is asked to provide personal information about himself or herself such as passwords and account numbers.
Learn more in: E-Technology Challenges to Information Privacy
38.
The process of sending emails or messages pretending to be another person who results in getting personal data from others such as credit card number or phone number.
Learn more in: Digital Terrorism Attack: Types, Effects, and Prevention
39.
The use of social engineering in e-mails for the purpose of deceiving the recipient into either compromising sensitive information or following a set of instructions that leads to a security breach.
Learn more in: Designing Antiphishing Education
40.
Fraudulent representation of an organization as sender.
Learn more in: Information Security Management
41.
Phishing
is a form of Web based identity theft where attackers employ deceit and social engineering to defraud users of their private and confidential information such as password, credit card number, social security number (SSN), and bank account number.
Learn more in: A Multistage Framework to Defend Against Phishing Attacks
42.
Phishing
is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
Learn more in: Digital Forensics and Data Mining
Find more terms and definitions using our
Dictionary Search
.
Phishing
appears in:
Handbook of Research on Information Security and...
Search inside this book for more research materials.
Recommend to a Librarian
Recommend to a Colleague
Looking for research materials? Search our database for more
Phishing
downloadable research papers.
InfoSci-OnDemand
Download Premium Research Papers
Full text search our database of 169,400 titles for
Phishing
to find related research papers.
Learn More About Phishing in These Related Titles
Critical Perspectives on Social Justice in S...
Social Sciences & Humanities
Copyright 2021. 355 pages.
There is very little discussion of socially just a...
In Stock
$37.50 Individual Chapters
Exploring Online Learning Through Synchronou...
Education
Copyright 2020. 333 pages.
Exploring online learning through the lens of sync...
In Stock
$37.50 Individual Chapters
Handbook of Research on the Global Impacts a...
Media & Communications
Copyright 2020. 539 pages.
The world is witnessing a media revolution similar...
In Stock
$37.50 Individual Chapters
Police Psychology and Its Growing Impact on...
Social Sciences & Humanities
Copyright 2017. 345 pages.
Police psychology has become an integral part of p...
In Stock
$37.50 Individual Chapters
Handbook of Research on Competency-Based Edu...
Education
Copyright 2017. 454 pages.
The majority of adult learners are looking to atta...
In Stock
$37.50 Individual Chapters
Censorship and Student Communication in Onli...
Education
Copyright 2016. 622 pages.
While freedom of speech is a defining characterist...
In Stock
$37.50 Individual Chapters
Modern Societal Impacts of the Model Minorit...
Social Sciences & Humanities
Copyright 2015. 403 pages.
The model minority stereotype is a form of racism...
In Stock
$37.50 Individual Chapters
Educational, Psychological, and Behavioral C...
Media & Communications
Copyright 2014. 465 pages.
Online communities continue to evolve as more peop...
In Stock
$37.50 Individual Chapters
Integrated Operations in the Oil and Gas Ind...
Business & Management
Copyright 2013. 457 pages.
The predicted “ICT revolution” has gained increasi...
In Stock
$37.50 Individual Chapters
Electronic Enterprise: Strategy and Architec...
Business & Management
Copyright 2003. 384 pages.
Enterprise evolution (or electronic enterprise) is...
In Stock
$37.50 Individual Chapters