Repository logo
 
Publication

The art of phishing

dc.contributor.authorGuarda, Teresa
dc.contributor.authorAugusto, Maria Fernanda
dc.contributor.authorLopes, Isabel Maria
dc.date.accessioned2019-02-05T11:41:59Z
dc.date.available2019-02-05T11:41:59Z
dc.date.issued2019
dc.description.abstractNowadays there are many threats that a company needs to protect itself. Everyone knows someone who has fallen for a coup by using an email, message or phone. People who pass by someone they trust, to extract data and money from the victim. These three ways are used to try convince someone to deliver accounts, credit card and document data in companies and at a particular level. According to Symantec, more than 6 hundreds of companies per day are targeted for Phishing, specifically Business E-Mail Compromise (BEC). In it, criminals pass through a central figure in the company, usually the CEO, and try to extract information or get employees to transfer money. This type of attack has generated in the last years losses of billions of dollars for the businesses affected. It is urgent that all company employees and individuals know as soon as possible what Phishing is and what steps to take.pt_PT
dc.description.versioninfo:eu-repo/semantics/publishedVersionpt_PT
dc.identifier.citationGuarda, T.; Augusto, M. F.; Lopes, Isabel Maria (2019). The art of phishing. In Rocha, Álvaro; Ferrás, Carlos; Paredes, Manolo [Eds.] Information technology and systems Springer. 918, p. 683-690. ISBN 978-3-030-11889-1pt_PT
dc.identifier.doi10.1007/978-3-030-11890-7_64
dc.identifier.isbn978-3-030-11889-1
dc.identifier.urihttp://hdl.handle.net/10198/18816
dc.language.isoengpt_PT
dc.peerreviewedyespt_PT
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/pt_PT
dc.subjectPhishingpt_PT
dc.subjectSpear phishingpt_PT
dc.subjectSMiShingpt_PT
dc.subjectQRishingpt_PT
dc.subjectVishingpt_PT
dc.subjectThreatspt_PT
dc.subjectSecuritypt_PT
dc.subjectIoTpt_PT
dc.titleThe art of phishingpt_PT
dc.typeconference paper
dspace.entity.typePublication
oaire.citation.endPage690pt_PT
oaire.citation.startPage683pt_PT
oaire.citation.titleInformation technology and systemspt_PT
oaire.citation.volume918pt_PT
person.familyNameLopes
person.givenNameIsabel Maria
person.identifier.ciencia-id8812-AE1C-A316
person.identifier.orcid0000-0002-5614-3516
person.identifier.ridA-1728-2014
person.identifier.scopus-author-id55211017300
rcaap.rightsopenAccesspt_PT
rcaap.typeconferenceObjectpt_PT
relation.isAuthorOfPublication111716db-94a0-4c24-b739-330dc2ae79fc
relation.isAuthorOfPublication.latestForDiscovery111716db-94a0-4c24-b739-330dc2ae79fc

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
artigo.pdf
Size:
3.77 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.75 KB
Format:
Item-specific license agreed upon to submission
Description: