Purpose – The purpose of this paper is to aim to educate the internet consumer, who may be a potential phishing victim, and to suggest a framework of anti‐phishing measures, following the staggering increase in the number of recent phishing attacks. Phishing describes a method of online identity theft, in which phishers typically pose as legitimate organisations when sending deceptive e‐mail messages to internet users. When they respond to such e‐mails, victims are lured to malicious web sites, where they are duped into disclosing their personal details. In this way, phishers are able to commit identity theft, with possibly devastating consequences for the victim.Design/methodology/approach – After a literature review of the available sources, the phishing threat is investigated by analysing the modus operandi of phishers and the basic components of a typical phishing scheme. A possible solution for the phishing problem is examined.Findings – Phishers continually target the weakest link in the security ch...
[1]
Rika Butler.
Investigation of phishing to develop guidelines to protect the Internet consumer's identity against attacks by phishers
,
2005
.
[2]
Steven M. Bellovin.
Spamming, phishing, authentication, and privacy
,
2004,
CACM.
[3]
Reid Goldsborough.
Don't Get "Phished" out of Cyberspace.
,
2004
.
[4]
Christopher Abad,et al.
The economy of phishing: A survey of the operations of the phishing market
,
2005,
First Monday.
[5]
Marti A. Hearst,et al.
Why phishing works
,
2006,
CHI.