[go: up one dir, main page]

Lee et al., 2020 - Google Patents

Phishing and Financial Manipulation

Lee et al., 2020

Document ID
339910730666810958
Author
Lee B
Paek S
Publication year
Publication venue
The Palgrave Handbook of International Cybercrime and Cyberdeviance

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Similar Documents

Publication Publication Date Title
Hutchings et al. The online stolen data market: disruption and intervention approaches
Omodunbi et al. Cybercrimes in Nigeria: Analysis, detection and prevention
Ali et al. Phishing—A cyber fraud: The types, implications and governance
Aburrous et al. Experimental case studies for investigating e-banking phishing techniques and attack strategies
Cagnazzo et al. GDPiRated–stealing personal information on-and offline
Trautman et al. Posted: No Phishing
Blanco Hache et al. ’Tis the season to (be jolly?) wise-up to online fraudsters. Criminals on the Web lurking to scam shoppers this Christmas: 1 a critical analysis of the United Kingdom's legislative provisions and policies to tackle online fraud
Wilner et al. On the social science of ransomware: Technology, security, and society
Butler A framework of anti‐phishing measures aimed at protecting the online consumer's identity
Hutchings et al. Displacing big data: How criminals cheat the system
Hummer et al. Identity theft and financial loss
Okocha et al. Online social networks misuse, cyber-crimes and counter-mechanisms in Nigeria
Ama et al. Cybersecurity Challenge in Nigeria Deposit Money Banks
ISER et al. Role of awareness to prevent personal disasters: reducing the risks of falling for phishing by strengthening user awareness
Greer The growth of cybercrime in the United States
Sankhwar et al. Cybercrime in India: an analysis of crime against women in ever expanding digital space
Lee et al. Phishing and Financial Manipulation
Khan Implication of cyber warfare on the financial sector. An exploratory study
Dam Relationship Between Demographic Variables and Awareness on Cybersecurity Threats: An Empirical Analysis
Aneke et al. Towards determining cybercrime technology evolution in Nigeria
Medlin et al. The cost of electronic retailing: Prevalent security threats and their results
Lee et al. Phishing and Financial Manipulation
Ayyagari Data breaches and carding
Balabantaray Examining the Impact of Cyber Fraud on Indian Society: An Assessment of the Potential Damage
AlMajed et al. Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Activities