2023
DOI: 10.1007/s10207-023-00768-x
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy

Richa Goenka,
Meenu Chawla,
Namita Tiwari
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 113 publications
0
2
0
Order By: Relevance
“…By implementing network segmentation and access control measures, organizations can significantly reduce the attack surface of their ICAS and make it more difficult for attackers to gain a foothold in the system. This first layer of defense provides a foundation for building a robust cybersecurity posture [20].…”
Section: Defense In Depth: Network Segmentation and Access Controlmentioning
confidence: 99%
“…By implementing network segmentation and access control measures, organizations can significantly reduce the attack surface of their ICAS and make it more difficult for attackers to gain a foothold in the system. This first layer of defense provides a foundation for building a robust cybersecurity posture [20].…”
Section: Defense In Depth: Network Segmentation and Access Controlmentioning
confidence: 99%
“…Traditional phishing often involves constructing counterfeit platforms like fake websites or software [12]. Attackers deceive users into believing they are interacting with legitimate entities, aiming to harvest sensitive information or prompt monetary transactions [13]. Such activities can manifest across various online platforms, including emails [14], social media, and sham websites.…”
Section: Introductionmentioning
confidence: 99%