The art of phishing
Main Author: | |
---|---|
Publication Date: | 2019 |
Other Authors: | , |
Language: | eng |
Source: | Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
Download full: | http://hdl.handle.net/10198/18816 |
Summary: | Nowadays there are many threats that a company needs to protect itself. Everyone knows someone who has fallen for a coup by using an email, message or phone. People who pass by someone they trust, to extract data and money from the victim. These three ways are used to try convince someone to deliver accounts, credit card and document data in companies and at a particular level. According to Symantec, more than 6 hundreds of companies per day are targeted for Phishing, specifically Business E-Mail Compromise (BEC). In it, criminals pass through a central figure in the company, usually the CEO, and try to extract information or get employees to transfer money. This type of attack has generated in the last years losses of billions of dollars for the businesses affected. It is urgent that all company employees and individuals know as soon as possible what Phishing is and what steps to take. |
id |
RCAP_2261ffe3a5411bb4c862ee5a4fb4aa85 |
---|---|
oai_identifier_str |
oai:bibliotecadigital.ipb.pt:10198/18816 |
network_acronym_str |
RCAP |
network_name_str |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
repository_id_str |
https://opendoar.ac.uk/repository/7160 |
spelling |
The art of phishingPhishingSpear phishingSMiShingQRishingVishingThreatsSecurityIoTNowadays there are many threats that a company needs to protect itself. Everyone knows someone who has fallen for a coup by using an email, message or phone. People who pass by someone they trust, to extract data and money from the victim. These three ways are used to try convince someone to deliver accounts, credit card and document data in companies and at a particular level. According to Symantec, more than 6 hundreds of companies per day are targeted for Phishing, specifically Business E-Mail Compromise (BEC). In it, criminals pass through a central figure in the company, usually the CEO, and try to extract information or get employees to transfer money. This type of attack has generated in the last years losses of billions of dollars for the businesses affected. It is urgent that all company employees and individuals know as soon as possible what Phishing is and what steps to take.Biblioteca Digital do IPBGuarda, TeresaAugusto, Maria FernandaLopes, Isabel Maria2019-02-05T11:41:59Z20192019-01-01T00:00:00Zconference objectinfo:eu-repo/semantics/publishedVersionapplication/pdfhttp://hdl.handle.net/10198/18816engGuarda, T.; Augusto, M. F.; Lopes, Isabel Maria (2019). The art of phishing. In Rocha, Álvaro; Ferrás, Carlos; Paredes, Manolo [Eds.] Information technology and systems Springer. 918, p. 683-690. ISBN 978-3-030-11889-1978-3-030-11889-110.1007/978-3-030-11890-7_64info:eu-repo/semantics/openAccessreponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiainstacron:RCAAP2025-02-25T12:09:02Zoai:bibliotecadigital.ipb.pt:10198/18816Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireinfo@rcaap.ptopendoar:https://opendoar.ac.uk/repository/71602025-05-28T11:35:49.420425Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiafalse |
dc.title.none.fl_str_mv |
The art of phishing |
title |
The art of phishing |
spellingShingle |
The art of phishing Guarda, Teresa Phishing Spear phishing SMiShing QRishing Vishing Threats Security IoT |
title_short |
The art of phishing |
title_full |
The art of phishing |
title_fullStr |
The art of phishing |
title_full_unstemmed |
The art of phishing |
title_sort |
The art of phishing |
author |
Guarda, Teresa |
author_facet |
Guarda, Teresa Augusto, Maria Fernanda Lopes, Isabel Maria |
author_role |
author |
author2 |
Augusto, Maria Fernanda Lopes, Isabel Maria |
author2_role |
author author |
dc.contributor.none.fl_str_mv |
Biblioteca Digital do IPB |
dc.contributor.author.fl_str_mv |
Guarda, Teresa Augusto, Maria Fernanda Lopes, Isabel Maria |
dc.subject.por.fl_str_mv |
Phishing Spear phishing SMiShing QRishing Vishing Threats Security IoT |
topic |
Phishing Spear phishing SMiShing QRishing Vishing Threats Security IoT |
description |
Nowadays there are many threats that a company needs to protect itself. Everyone knows someone who has fallen for a coup by using an email, message or phone. People who pass by someone they trust, to extract data and money from the victim. These three ways are used to try convince someone to deliver accounts, credit card and document data in companies and at a particular level. According to Symantec, more than 6 hundreds of companies per day are targeted for Phishing, specifically Business E-Mail Compromise (BEC). In it, criminals pass through a central figure in the company, usually the CEO, and try to extract information or get employees to transfer money. This type of attack has generated in the last years losses of billions of dollars for the businesses affected. It is urgent that all company employees and individuals know as soon as possible what Phishing is and what steps to take. |
publishDate |
2019 |
dc.date.none.fl_str_mv |
2019-02-05T11:41:59Z 2019 2019-01-01T00:00:00Z |
dc.type.driver.fl_str_mv |
conference object |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://hdl.handle.net/10198/18816 |
url |
http://hdl.handle.net/10198/18816 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
Guarda, T.; Augusto, M. F.; Lopes, Isabel Maria (2019). The art of phishing. In Rocha, Álvaro; Ferrás, Carlos; Paredes, Manolo [Eds.] Information technology and systems Springer. 918, p. 683-690. ISBN 978-3-030-11889-1 978-3-030-11889-1 10.1007/978-3-030-11890-7_64 |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.source.none.fl_str_mv |
reponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia instacron:RCAAP |
instname_str |
FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
collection |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
repository.name.fl_str_mv |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia |
repository.mail.fl_str_mv |
info@rcaap.pt |
_version_ |
1833592052617576448 |