Provided by: International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Phishing /Pharming/Web Spoofing attacks are widely used to gather user personal information, including usernames and passwords. One possible scenario for such an attack arises when an attacker creates a spoofed web site that looks identical to a genuine web site, and convinces the victim to visit the spoofed web site e.g. by including a URL in a faked email. The phishing attacks can also be used to protect against other online attacks. The act of sending an e-mail to a client fallaciously declares to be a recognized genuine organization in an Endeavour to deceive the client into compromise confidential information that will be used for identity theft.