Identifying Methods of Web Attacks towards Minimizing their Effects on Websites

Download Now
Provided by: International Journal of Applied Information Systems (IJAIS)
Topic: Security
Format: PDF
In this paper, the authors set out to identify methods that phishers employ to attack unsuspecting internet users. The aim was for the purpose of minimizing their effects on websites as well as users. Eleven statements, namely, e-mails, Web based, malware based, Internet Relay Chats (IRCs) Man In The Middle (MITM) Domain Name Server (DNS) based, impersonate, forward attack, pop-up attack, voice phishing and mobile phishing, depicting methods used by phishers to carry out their attacks against unsuspecting victims who are the internet users were presented to respondents to indicate their level of agreement.
Download Now

Find By Topic