Norfolk State University Socio-CybersecurityNorfolk State University Socio-Cybersecurity
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    Register Login

    Anti-Phishing Principles

    • Home
    • Modules
    • Social Problems
    • Phishing
    • Anti-Phishing Principles

    Protection Against Phishing through Training and Education

    Training users to identify phish is an important component in the fight against phishing. Training has taken shape in two forms. The first is simply to provide anti-phishing information to users through e-mail and other media. The second is to give firsthand experience to users through games, simulated phish, cartoons, etc. Recent studies [7] seem to indicate that the latter—giving firsthand experience to users—might be more effective.

    The game, Anti-Phishing Phil (the two pictures immediately below), which teaches people how to identify suspicious Web site addresses while providing the experience of being captured by a phisher, is such an example (http://www.ucl.ac.uk/cert/antiphishing/).

    PhishGuru is another example. It delivers cartoon-based, anti-phishing information after a user has been deceived by simulated phishing messages.

    PhishGuru Anti- Phishing Video

    Anti-Phishing Technologies

    Although user ability to identify phish is an important component in the battle against phishing, combining it with technology yields better results [7]. One of the techniques used to automatically identify phish is filtering. The objective of filtering is to identify (or flag) phishing attempts in e-mail or on Web pages. Filters are usually integrated into browsers or e-mail software. When a Web address is encountered the software compares it with a so-called “blacklist” of known phishing Web sites. It then takes appropriate actions, which usually include informing the user. The blacklist is updated periodically (for example, every 30 minutes) as new phishing sites become available. As with any blacklist, there is also a “whitelist” of known legitimate sites.

    References

    • 30 December 2008. 3 January 2009. <www.antiphishing.org>.
    • Bond, Mark. “Being an Ethical Warrior: How Labeling Theory Influences Police Officers and Their Patrol Perceptions.” Public Safety 6 February 2014.
    • Ciampa, Mark. Security+, Guide to Network Security Fundamentals Second Edition Update. Third. Boston: Thomson Course Technology, 2008.
    • Costa, Garrett, et al. Protocolv2Spec: Client specification for the Google Safe Browsing v2.1 protocol . 20 November 2007. Google. 6 January 2009. <http://code.google.com/p/google-safe-browsing/wiki/Protocolv2Spec>.
    • Cranor, Lorrie Faith. How to Foil “Phishing” Scams. 3 December 2008. Scientific American. 5 January 2009. <http://www.sciam.com/sciammag/?contents=2008-12>.
    • Dulaney, Emmett. CompTIA Security +, Deluxe Study Guide, Exam SYO-201. Indianapolis, Indiana: Wiley Publishing, 2009.
    • Eitzen, D. Stanley, Maxine Bacca Zinn and Kelly Eitzen Smith. SOcial Problems. Boston: Pearson, 2014.
    • Fette, Ian, Norman Sadeh and Anthony Tomasic. “Learning to detect phishing emails.” Proceedings of the 16th international conference on World Wide Web. n.d.
    • Fitzpatrick, Joey. Phishing scam artists get personal on Facebook. 29 December 2008. 31 December 2008. <http://thechronicleherald.ca/Columnists/1098083.html>.
    • Mozilla. Phishing and Malware Protection. 2005-2009. Mozilla. 6 January 2009. <http://www.mozilla.com/en-US/firefox/phishing-protection/>.
    • Pfleeger, Charles P. Security in Computing. Fourth Edition. Upper Saddle River: Prentice Hall, 2007.
    • Phishing Activity Trends Report. April-June 2008. 3 January 2009. <http://www.antiphishing.org/reports/apwg_report_Q2_2008.pdf>.
    • Phishing Protection: Design Documentation. 5 March 2008. MediaWiki. 6 January 2009. <https://wiki.mozilla.org/Phishing_Protection:_Design_Documentation>.
    • Recognize phishing scams and fraudulent e-mail. 15 October 2008. Microsoft. 29 December 2008. <http://www.microsoft.com/protect/yourself/phishing/identify.mspx>.
    • Shelly, Gary B., Thomas J. Cashman and Misty E. Vermaat. Computer Literacy and Applications. United States: Thomson Course Technology, 2008.
    • University, Carnegie Mellon. Anti-Phishing Phil. September 2008. Wombot Security Technologies. 5 January 2009. <http://cups.cs.cmu.edu/antiphishing_phil/>.
    • What is Social Engineering. 16 January 2007. Microsoft. 29 December 2008. <http://www.microsoft.com/protect/yourself/phishing/engineering.mspx>.
    • Zhang, Yue, Jason Hong and Lorrie Craner. “CANTINA: A Content-Based Approach to Detecting Phishing Web Sites.” International World Wide Web Conference. Banff, Alberta, Canada.: ACM, 2007.

    Search

    Department of Sociology
    Norfolk State University
    700 Park Avenue,
    Norfolk,
    Virginia 23504
    USA
    Tel: 757-823-8436

    This Project is funded by the National Science Foundation

    © 2019. NSU Socio-Cybersecurity Project. All Rights Reserved