Analysis of the vulnerability of IT system users to a phishing attack
Article Sidebar
Open full text
Issue Vol. 15 (2020)
-
Neural networks in recognition of handwriting
Bernadetta Michalik, Marek Miłosz109-113
-
Influence the quality of the interface of online stores on their memorability
Katarzyna Pytka, Marek Miłosz114-120
-
Comparison of the NFC authentication method with the methods available in Android
Dmytro Malenko121-125
-
Comparative analysis of database systems dedicated for Android
Kamil Wałachowski, Grzegorz Kozieł126-132
-
Digital services in Poland and the Far East - comparative analysis
Dominik Klej133-138
-
Modern technologies for creating graphical user interface in web applications
Mateusz Kaproń, Beata Pańczyk139-142
-
Verification of the precision of GSM and GPS signals available on mobile devices
Mateusz Wlaź, Grzegorz Kozieł143-149
-
Corporate intranet platform – open and commercial solutions comparison
Konrad Czarny150-155
-
Comparative analysis of solutions used in automated testing
Agnieszka Dorota Wac, Tomasz Kamil Watras, Grzegorz Kozieł156-163
-
Analysis of the vulnerability of IT system users to a phishing attack
Szymon Grzebielec164-167
-
Contactless interfaces in virtual reality
Andriy Dragni, Tomasz Szymczyk168-171
-
The system using mobile technologies to test reaction time
Michał Woś, Artur Zdzioch172-177
-
Comparative analysis of a selected version of the Symfony framework
Michał Jusięga, Mariusz Dzieńkowski178-183
-
Containerization methods in internet service applications
Krzysztof Ferenc184-188
-
Performance analysis of languages working on Java Virtual Machine based on Java, Scala and Kotlin
Katarzyna Buszewicz189-195
-
The "Quizer" e-learning platform as a tool for creating interactive quizzes with multiplayer functionality
Krzysztof Dziedzic, Marek Gudków, Tomasz Wiśniewski196-201
-
Analysis of typical programming mistakes made by first and second year IT students
Monika Kaczorowska202-205
-
Object classification using X-ray images
Piotr Nowosad, Małgorzata Charytanowicz206-213
-
Semi-supervised learning with the clustering and Decision Trees classifier for the task of cognitive workload study
Martyna Wawrzyk214-218
Main Article Content
DOI
Authors
Abstract
This article presents an analysis of users' vulnerability to phishing attacks. The study was carried out using a self-prepared attack. A phishing attack was carried out on a group of 100 people. The subjects were divided into two groups of 50 people. The first group was attacked from a private, trusted account. The second group was attacked from a foreign email address. The attacked people were asked to complete the survey, its results and conclusions are presented in this article.
Keywords:
References
https://www.wirtualnemedia.pl/artykul/22-miliardy-urzadzen-podlaczonych-do-internetu [28.10.2019]
http://www.benchmark.pl/aktualnosci/ile-osob-ma-dostep-do-internetu-na-swiecie-juz-ponad-4-miliardy.html [28.10.2019]
http://edu.pjwstk.edu.pl/wyklady/bdk/scb/main06.html [28.10.2019]
https://devpark.pl/pl/najpopularniejsze-wedlug-owasp-rodzaje-atakow-sieciowych-i-jak-sie-przed-nimi-zabezpieczyc/ [28.10.2019]
https://www.cert.pl/ [28.10.2019]
https://www.firmex.com/thedealroom/spear-phishing-whos-getting-caught/ [28.10.2019]
https://www.secureworks.com/research/threat-group-4127-targets-google-accounts [28.10.2019]
https://www.theregister.co.uk/2008/04/16/whaling_expedition_continues/ [28.10.2019]
https://www.lifewire.com/what-is-whaling-2483605 [28.10.2019]
https://www.prnews.pl [28.10.2019]
https://retruster.com/blog/2019-phishing-and-email-fraud-statistics.html [28.10.2019]
https://www.securelist.pl/analysis/7483,spam_i_phishing_w_2018_r.html [28.10.2019]
https://www.webroot.com [28.10.2019]
Article Details
Abstract views: 497
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
