Essay Undergraduate 666 words Human Written

Phishing: What Is it and How to

Last reviewed: ~4 min read Literature › Fake
80% visible
Read full paper →
Paper Overview

Phishing: What is it and how to prevent it? 'Phishing' messages have grown increasingly common online. Phishing is a scam technique used to solicit user's credit card information, social security numbers, and other vital data. "Phishing messages usually take the form of fake notifications from banks, providers, e-pay systems and other organizations....

Writing Guide
How to Write a Literature Review with Examples

Writing a literature review is a necessary and important step in academic research. You’ll likely write a lit review for your Master’s Thesis and most definitely for your Doctoral Dissertation. It’s something that lets you show your knowledge of the topic. It’s also a way...

Related Writing Guide

Read full writing guide

Related Writing Guides

Read Full Writing Guide

Full Paper Example 666 words · 80% shown · Sign up to read all

Phishing: What is it and how to prevent it? 'Phishing' messages have grown increasingly common online. Phishing is a scam technique used to solicit user's credit card information, social security numbers, and other vital data. "Phishing messages usually take the form of fake notifications from banks, providers, e-pay systems and other organizations. The notification will try to encourage a recipient, for one reason or another, to urgently enter/update their personal data. Such excuses usually relate to loss of data, system breakdown, etc." (What is phishing, 2012, Secure List).

These messages may be sent in a general fashion or to a target base of users. It is not unusual to get a phishing message from, say, Bank of America, even though the recipient has no Bank of America account. The hope is that users who do use BoA will mistake the message for a real notification, open the email, and follow the instructions.

Scare techniques prompt the user to enter their data: "if you do not provide your personal data by the end of the week, your account will be blocked" (What is phishing, 2012, Secure List). "Some phishing emails will deliberately misspell key words to bypass SPAM filters, which most people would not recognize when quickly glancing at the subject line" (Phishing email scams, 2012, Fraud Watch International). Phishers often use photoshopping or other forms of technology to make their correspondence look 'official,' which can catch casual readers off-guard.

While the wording and the visuals may be questionable, this may go unnoticed on a first glance. But "the 'quality' of phishing messages is usually very high. A fake site will generally look exactly like the original so that a user will not suspect anything is wrong when they enter their user name and password to access the site" (What is phishing, 2012, Secure List).

The fact that 'multitasking' is so common when users are online also is conducive to phishing, as a user may not think twice about why the bank he or she patronized yesterday suddenly claims there is a problem with a transaction and needs his or her security code or ATM number. Phishers do not always use the data themselves; they may sell the information to third parties to reduce the risk of getting caught.

Because anti-phishing software quickly catches and blocks most phishing sites, phishers must continually set up new websites to run their schemes. Of course, "sometimes a user is required to enter their confidential data on the same page as the message itself. Everyone should be alert to the fact that no legitimate bank or other similar organization would ever ask a user to do this" (What is phishing, 2012, Secure List).

Other phishing emails are more sophisticated and use disguised hyperlinks: the reader clicks to a link that looks legitimate, but a fraudulent site is hidden in the actual email (Phishing email scams, 2012, Fraud Watch International). Fraudulent phishing websites "utilize copied images, text and in some cases simply mirror the legitimate web site" (Phishing website methods, 2012, Fraud Watch Intern). They may have a URL very similar to the original website or create a false address bar that hides the website's true address. To.

134 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
9 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Phishing What Is It And How To" (2012, December 03) Retrieved April 21, 2026, from
https://www.paperdue.com/essay/phishing-what-is-it-and-how-to-83492

Always verify citation format against your institution's current style guide.

80% of this paper shown 134 words remaining