Phishing evolves: analyzing the enduring cybercrime

Phishing, the fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity via electronic communication, has quickly evolved beyond low-skill schemes that relied on casting “a wide net.” Spear phishing attacks target a particular high-value individual utilizing so...

Descripción completa

Guardado en:  
Detalles Bibliográficos
Autor principal: Ghazi-Tehrani, Adam K. (Autor)
Otros Autores: Pontell, Henry N. 1950- (Autor)
Tipo de documento: Print Artículo
Lenguaje:Inglés
Publicado: 2023
En: The new technology of financial crime
Año: 2023, Páginas: 35-61
Verificar disponibilidad: HBZ Gateway

MARC

LEADER 00000caa a2200000 c 4500
001 1925311112
003 DE-627
005 20250625043625.0
007 tu
008 250512s2023 xx ||||| 00| ||eng c
020 |a 9781032192031 
035 |a (DE-627)1925311112 
035 |a (DE-599)KXP1925311112 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Ghazi-Tehrani, Adam K.  |e VerfasserIn  |0 (DE-588)1369532830  |0 (DE-627)1928946674  |4 aut 
109 |a Ghazi-Tehrani, Adam K.  |a Tehrani, Adam K. Ghazi- 
245 1 0 |a Phishing evolves: analyzing the enduring cybercrime  |c Adam Kavon Ghazi-Tehrani and Henry N. Pontell 
264 1 |c 2023 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
500 |a Literaturverzeichnis: Seite 56-61 
500 |a Originally published in: Victim & Offenders, volume 16, issue 3 (2021), pp. 316-342 
520 |a Phishing, the fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity via electronic communication, has quickly evolved beyond low-skill schemes that relied on casting “a wide net.” Spear phishing attacks target a particular high-value individual utilizing sophisticated techniques. This study aims to describe the current state of phishing, the expected technological advances and developments of the near future, and the best prevention and enforcement strategies. Data comes from interviews with approximately 60 information technology security professionals, “hackers,” and academic researchers. Routine Activity Theory provided an operational framework; while it is an imperfect fit for most crimes, it provides enough explanatory power for cyber-crimes. Interviewees mainly agreed: First, technological advances increase the proliferation of phishing attacks, but also aid in their detection. It has never been easier to conduct a simple attack, but a good attack requires more effort than ever before. Second, phishing is directly responsible financial fraud and, indirectly, as the primary attack vector for ransomware. Third, newer types of attacks utilizing technology, like deepfakes, will make the problem worse in the short-term. Fourth, prevention will come from machine learning and public education akin to WIFI security improvement via the combination of encryption and password awareness. 
700 1 |a Pontell, Henry N.  |d 1950-  |e VerfasserIn  |0 (DE-588)1046475614  |0 (DE-627)776493892  |0 (DE-576)162591616  |4 aut 
773 0 8 |i Enthalten in  |t The new technology of financial crime  |d London : Routledge, 2023  |g (2023), Seite 35-61  |h x, 242 Seiten  |w (DE-627)1811285341  |z 9781032192024  |z 9781032192031  |7 nnam 
773 1 8 |g year:2023  |g pages:35-61 
951 |a AR 
ELC |b 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4723490256 
LOK |0 003 DE-627 
LOK |0 004 1925311112 
LOK |0 005 20250512102941 
LOK |0 008 250512||||||||||||||||ger||||||| 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
ORI |a WA-MARC-krimdoka001.raw