Phishing Attacks Survey: Types, Vectors, and Technical Approaches
Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which are growing rapidly. Therefore, there is a need...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-09-01
|
Series: | Future Internet |
Subjects: | |
Online Access: | https://www.mdpi.com/1999-5903/12/10/168 |
_version_ | 1797552181689188352 |
---|---|
author | Rana Alabdan |
author_facet | Rana Alabdan |
author_sort | Rana Alabdan |
collection | DOAJ |
description | Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which are growing rapidly. Therefore, there is a need to conduct a comprehensive review of past and current phishing approaches. In this paper, a review of the approaches used during phishing attacks is presented. This paper comprises a literature review, followed by a comprehensive examination of the characteristics of the existing classic, modern, and cutting-edge phishing attack techniques. The aims of this paper are to build awareness of phishing techniques, educate individuals about these attacks, and encourage the use of phishing prevention techniques, in addition to encouraging discourse among the professional community about this topic. |
first_indexed | 2024-03-10T15:56:20Z |
format | Article |
id | doaj.art-ddbbba3cc5634bab926bedbe02793b74 |
institution | Directory Open Access Journal |
issn | 1999-5903 |
language | English |
last_indexed | 2024-03-10T15:56:20Z |
publishDate | 2020-09-01 |
publisher | MDPI AG |
record_format | Article |
series | Future Internet |
spelling | doaj.art-ddbbba3cc5634bab926bedbe02793b742023-11-20T15:38:12ZengMDPI AGFuture Internet1999-59032020-09-01121016810.3390/fi12100168Phishing Attacks Survey: Types, Vectors, and Technical ApproachesRana Alabdan0Department of Information Systems, College of Computer and Information Sciences, Majmaah University, Majmaah 11952, Saudi ArabiaPhishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which are growing rapidly. Therefore, there is a need to conduct a comprehensive review of past and current phishing approaches. In this paper, a review of the approaches used during phishing attacks is presented. This paper comprises a literature review, followed by a comprehensive examination of the characteristics of the existing classic, modern, and cutting-edge phishing attack techniques. The aims of this paper are to build awareness of phishing techniques, educate individuals about these attacks, and encourage the use of phishing prevention techniques, in addition to encouraging discourse among the professional community about this topic.https://www.mdpi.com/1999-5903/12/10/168phishing attacksphishing typesphishing vectorsphishing technical approaches |
spellingShingle | Rana Alabdan Phishing Attacks Survey: Types, Vectors, and Technical Approaches Future Internet phishing attacks phishing types phishing vectors phishing technical approaches |
title | Phishing Attacks Survey: Types, Vectors, and Technical Approaches |
title_full | Phishing Attacks Survey: Types, Vectors, and Technical Approaches |
title_fullStr | Phishing Attacks Survey: Types, Vectors, and Technical Approaches |
title_full_unstemmed | Phishing Attacks Survey: Types, Vectors, and Technical Approaches |
title_short | Phishing Attacks Survey: Types, Vectors, and Technical Approaches |
title_sort | phishing attacks survey types vectors and technical approaches |
topic | phishing attacks phishing types phishing vectors phishing technical approaches |
url | https://www.mdpi.com/1999-5903/12/10/168 |
work_keys_str_mv | AT ranaalabdan phishingattackssurveytypesvectorsandtechnicalapproaches |