Analysis of the vulnerability of IT system users to a phishing attack
Abstract
This article presents an analysis of users' vulnerability to phishing attacks. The study was carried out using a self-prepared attack. A phishing attack was carried out on a group of 100 people. The subjects were divided into two groups of 50 people. The first group was attacked from a private, trusted account. The second group was attacked from a foreign email address. The attacked people were asked to complete the survey, its results and conclusions are presented in this article.
Keywords:
network security; network attacks; phishingReferences
https://www.wirtualnemedia.pl/artykul/22-miliardy-urzadzen-podlaczonych-do-internetu [28.10.2019]
Google Scholar
http://www.benchmark.pl/aktualnosci/ile-osob-ma-dostep-do-internetu-na-swiecie-juz-ponad-4-miliardy.html [28.10.2019]
Google Scholar
http://edu.pjwstk.edu.pl/wyklady/bdk/scb/main06.html [28.10.2019]
Google Scholar
https://devpark.pl/pl/najpopularniejsze-wedlug-owasp-rodzaje-atakow-sieciowych-i-jak-sie-przed-nimi-zabezpieczyc/ [28.10.2019]
Google Scholar
https://www.cert.pl/ [28.10.2019]
Google Scholar
https://www.firmex.com/thedealroom/spear-phishing-whos-getting-caught/ [28.10.2019]
Google Scholar
https://www.secureworks.com/research/threat-group-4127-targets-google-accounts [28.10.2019]
Google Scholar
https://www.theregister.co.uk/2008/04/16/whaling_expedition_continues/ [28.10.2019]
Google Scholar
https://www.lifewire.com/what-is-whaling-2483605 [28.10.2019]
Google Scholar
https://www.prnews.pl [28.10.2019]
Google Scholar
https://retruster.com/blog/2019-phishing-and-email-fraud-statistics.html [28.10.2019]
Google Scholar
https://www.securelist.pl/analysis/7483,spam_i_phishing_w_2018_r.html [28.10.2019]
Google Scholar
https://www.webroot.com [28.10.2019]
Google Scholar
Statistics
Abstract views: 407PDF downloads: 361
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.