In-session Phishing - Process

Process

Initial process of how phishers prepare the ground for their attacks.

This article stated how phishing attacks can be subdivided into three phases:

  • Creation of a bogus web site that mimics the website of the bank that is the target of the attack.
  • Uploading of the web page onto one's own site or else the compromising of an existing site.
  • Mass emailing to lure the unwary to the bogus site.

Using the combination of all three techniques allows the attacker to carry out his plan. The attack's success, however, depends on factors such as; credibility of the site, contents of the email message, and the user's critical analysis capacity and IT proficiency.

Read more about this topic:  In-session Phishing

Famous quotes containing the word process:

    The invention of photography provided a radically new picture-making process—a process based not on synthesis but on selection. The difference was a basic one. Paintings were made—constructed from a storehouse of traditional schemes and skills and attitudes—but photographs, as the man on the street put, were taken.
    Jean Szarkowski (b. 1925)

    Consumer wants can have bizarre, frivolous, or even immoral origins, and an admirable case can still be made for a society that seeks to satisfy them. But the case cannot stand if it is the process of satisfying wants that creates the wants.
    John Kenneth Galbraith (b. 1908)

    The toddler’s wish to please ... is a powerful aid in helping the child to develop a social awareness and, eventually, a moral conscience. The child’s love for the parent is so strong that it causes him to change his behavior: to refrain from hitting and biting, to share toys with a peer, to become toilet trained. This wish for approval is the parent’s most reliable ally in the process of socializing the child.
    Alicia F. Lieberman (20th century)