Phishing evolves: analyzing the enduring cybercrime
Phishing, the fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity via electronic communication, has quickly evolved beyond low-skill schemes that relied on casting “a wide net.” Spear phishing attacks target a particular high-value individual utilizing so...
Autor principal: | |
---|---|
Otros Autores: | |
Tipo de documento: | Print Artículo |
Lenguaje: | Inglés |
Publicado: |
2023
|
En: |
The new technology of financial crime
Año: 2023, Páginas: 35-61 |
Verificar disponibilidad: | HBZ Gateway |
MARC
LEADER | 00000caa a2200000 c 4500 | ||
---|---|---|---|
001 | 1925311112 | ||
003 | DE-627 | ||
005 | 20250625043625.0 | ||
007 | tu | ||
008 | 250512s2023 xx ||||| 00| ||eng c | ||
020 | |a 9781032192031 | ||
035 | |a (DE-627)1925311112 | ||
035 | |a (DE-599)KXP1925311112 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Ghazi-Tehrani, Adam K. |e VerfasserIn |0 (DE-588)1369532830 |0 (DE-627)1928946674 |4 aut | |
109 | |a Ghazi-Tehrani, Adam K. |a Tehrani, Adam K. Ghazi- | ||
245 | 1 | 0 | |a Phishing evolves: analyzing the enduring cybercrime |c Adam Kavon Ghazi-Tehrani and Henry N. Pontell |
264 | 1 | |c 2023 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a Literaturverzeichnis: Seite 56-61 | ||
500 | |a Originally published in: Victim & Offenders, volume 16, issue 3 (2021), pp. 316-342 | ||
520 | |a Phishing, the fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity via electronic communication, has quickly evolved beyond low-skill schemes that relied on casting “a wide net.” Spear phishing attacks target a particular high-value individual utilizing sophisticated techniques. This study aims to describe the current state of phishing, the expected technological advances and developments of the near future, and the best prevention and enforcement strategies. Data comes from interviews with approximately 60 information technology security professionals, “hackers,” and academic researchers. Routine Activity Theory provided an operational framework; while it is an imperfect fit for most crimes, it provides enough explanatory power for cyber-crimes. Interviewees mainly agreed: First, technological advances increase the proliferation of phishing attacks, but also aid in their detection. It has never been easier to conduct a simple attack, but a good attack requires more effort than ever before. Second, phishing is directly responsible financial fraud and, indirectly, as the primary attack vector for ransomware. Third, newer types of attacks utilizing technology, like deepfakes, will make the problem worse in the short-term. Fourth, prevention will come from machine learning and public education akin to WIFI security improvement via the combination of encryption and password awareness. | ||
700 | 1 | |a Pontell, Henry N. |d 1950- |e VerfasserIn |0 (DE-588)1046475614 |0 (DE-627)776493892 |0 (DE-576)162591616 |4 aut | |
773 | 0 | 8 | |i Enthalten in |t The new technology of financial crime |d London : Routledge, 2023 |g (2023), Seite 35-61 |h x, 242 Seiten |w (DE-627)1811285341 |z 9781032192024 |z 9781032192031 |7 nnam |
773 | 1 | 8 | |g year:2023 |g pages:35-61 |
951 | |a AR | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4723490256 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1925311112 | ||
LOK | |0 005 20250512102941 | ||
LOK | |0 008 250512||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-2619 | ||
LOK | |0 852 1 |9 00 | ||
ORI | |a WA-MARC-krimdoka001.raw |