loading page

Phishing Websites & Counter Measures
  • +2
  • 1st Sai Teja Veeramalla,
  • 2nd Tathagata Bhattacharya,
  • 3rd Jaideep Nutakki,
  • 4th Mohammed Raziuddin,
  • 5th Mohammed Akram Ahmed
1st Sai Teja Veeramalla
Auburn University at Montgomery

Corresponding Author:[email protected]

Author Profile
2nd Tathagata Bhattacharya
Auburn University at Montgomery
Author Profile
3rd Jaideep Nutakki
Auburn University at Montgomery
Author Profile
4th Mohammed Raziuddin
Auburn University at Montgomery
Author Profile
5th Mohammed Akram Ahmed
Auburn University at Montgomery
Author Profile

Abstract

Today’s internet technology is so prevalent that it has improved the quality of people’s lives in a variety of ways, such as online social networking and banking. Security risks to systems and networks are continually evolving because of the development of Internet technologies. Phishing is one such major issue, in which attackers try to steal the user’s credentials by using bogus emails, websites, or both. The creation of solutions to counter phishing attacks is a top priority for both businesses and academics. Therefore, it is crucial for businesses to focus on end-user education while preventing phishing threats. Consequently, our paper’s goal is demonstrate the different approaches to clone the webpage. We will start by going into great depth into the background of phishing attacks and the motivation of the perpetrators. Then, we will give a taxonomy of the many sorts of phishing.