The evolution of technology over the years has allowed people to more easily store, access, and share information on the Internet. People can bank online, shop, and post their latest life news. Unfortunately, all this available information has attracted the attention of cybercriminals who want to use this personal information for fraudulent purposes. A common technique used by cybercriminals to obtain sensitive information is a scam called phishing. Criminals pose as a trusted entity in order to trick victims into revealing sensitive information that they will later use to commit illegal money transfers, identity theft, or other fraud. The consequences of phishing scams may lead to the loss of data, money, identity, reputation, and trust. As a result, organizations and individuals need to familiarize themselves with the process of a phishing attack and how to protect their systems and information. Organizations and individuals not only need the proper hardware and software to protect their information, but they also need to understand that cybercriminals prey on human psychology. Cybercriminals often use social engineering tactics to persuade people to willingly share their personal information. Therefore, cybersecurity policies and security prevention tips should address technical elements, as well as human behavioral factors that use the CIA (Confidentiality, Integrity, and Availability) model as a guide.
The Impact of Workload on Phishing Susceptibility: An Experiment
Phishing is when social engineering is used to deceive a person into sharing sensitive information or downloading...