Research output: Contribution to specialist publication › Article
Phishing for Data: Digital Forensic Integrity. / Medhurst, Rachael.
In: eForensics Magazine, Vol. 08, No. 08, 01.08.2019, p. 37-44.Research output: Contribution to specialist publication › Article
}
TY - GEN
T1 - Phishing for Data: Digital Forensic Integrity
AU - Medhurst, Rachael
PY - 2019/8/1
Y1 - 2019/8/1
N2 - Phishing is a cybercrime in which a target or targets are contacted by email by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details and passwords’ (Phishing.org, 2019). Unfortunately, businesses andemployees are often the target of phishing emails, which target four appeals,fear, greed, obedience and helpfulness, to enable a successful cyber-attack against the company. The four appeals are utilised because this targets the human element of the employee; for example, if the employee doesn’t complete the requested task then they have not fulfilled their job rolesuccessfully, which brings fear of receiving disciplinary action within the workplace. By the employee completing the task out of fear, this may provide information to the attacker or install malware on their system to enable them to conduct criminal activity.
AB - Phishing is a cybercrime in which a target or targets are contacted by email by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details and passwords’ (Phishing.org, 2019). Unfortunately, businesses andemployees are often the target of phishing emails, which target four appeals,fear, greed, obedience and helpfulness, to enable a successful cyber-attack against the company. The four appeals are utilised because this targets the human element of the employee; for example, if the employee doesn’t complete the requested task then they have not fulfilled their job rolesuccessfully, which brings fear of receiving disciplinary action within the workplace. By the employee completing the task out of fear, this may provide information to the attacker or install malware on their system to enable them to conduct criminal activity.
KW - Digital
KW - Forensics
KW - Investigations
KW - Phishing
KW - Attacks
KW - E-mail
M3 - Article
VL - 08
SP - 37
EP - 44
JO - eForensics Magazine
JF - eForensics Magazine
SN - 2300-6986
ER -
ID: 3482431