Phishing: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
(Added link)
imported>Doug Williamson
No edit summary
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
''Cybercrime''
''Cybercrime''.


Phishing is an email-based fraud.
Phishing is an email-based fraud.
Line 5: Line 5:


The fraudsters send emails purporting to be from reputable companies or other legitimate sources, in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
The fraudsters send emails purporting to be from reputable companies or other legitimate sources, in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
:<span style="color:#4B0082">'''''Most common attacks'''''</span>
:"The most common attacks seen across the Barclays network are phishing scams, through which cybercriminals send malicious emails to gain access to networks and personal information."
:''Ludwig Keyser, Director of Joint Operations Centre, Barclays - EACT Conference Tackling cyber risks in treasury, January 2019.''




Line 20: Line 25:
* [[Spoofing]]
* [[Spoofing]]
* [[Whaling]]
* [[Whaling]]
[[Category:Identify_and_assess_risks]]
[[Category:Manage_risks]]
[[Category:Technology]]

Revision as of 21:51, 23 May 2019

Cybercrime.

Phishing is an email-based fraud.


The fraudsters send emails purporting to be from reputable companies or other legitimate sources, in order to induce individuals to reveal personal information, such as passwords and credit card numbers.


Most common attacks
"The most common attacks seen across the Barclays network are phishing scams, through which cybercriminals send malicious emails to gain access to networks and personal information."
Ludwig Keyser, Director of Joint Operations Centre, Barclays - EACT Conference Tackling cyber risks in treasury, January 2019.


The name 'phishing' is a grim joke variant on 'fishing'.


See also