Standard

Phishing for Data: Digital Forensic Integrity. / Medhurst, Rachael.

In: eForensics Magazine, Vol. 08, No. 08, 01.08.2019, p. 37-44.

Research output: Contribution to specialist publicationArticle

Harvard

Medhurst, R 2019, 'Phishing for Data: Digital Forensic Integrity' eForensics Magazine, vol. 08, no. 08, pp. 37-44.

APA

Medhurst, R. (2019). Phishing for Data: Digital Forensic Integrity. eForensics Magazine, 08(08), 37-44.

Vancouver

Medhurst R. Phishing for Data: Digital Forensic Integrity. eForensics Magazine. 2019 Aug 1;08(08):37-44.

Author

Medhurst, Rachael. / Phishing for Data: Digital Forensic Integrity. In: eForensics Magazine. 2019 ; Vol. 08, No. 08. pp. 37-44.

BibTeX

@misc{da9a59c1f41c4e17837a9071ec476a91,
title = "Phishing for Data: Digital Forensic Integrity",
abstract = "Phishing is a cybercrime in which a target or targets are contacted by email by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details and passwords{\textquoteright} (Phishing.org, 2019). Unfortunately, businesses andemployees are often the target of phishing emails, which target four appeals,fear, greed, obedience and helpfulness, to enable a successful cyber-attack against the company. The four appeals are utilised because this targets the human element of the employee; for example, if the employee doesn{\textquoteright}t complete the requested task then they have not fulfilled their job rolesuccessfully, which brings fear of receiving disciplinary action within the workplace. By the employee completing the task out of fear, this may provide information to the attacker or install malware on their system to enable them to conduct criminal activity. ",
keywords = "Digital, Forensics, Investigations, Phishing, Attacks, E-mail",
author = "Rachael Medhurst",
year = "2019",
month = aug,
day = "1",
language = "English",
volume = "08",
pages = "37--44",
journal = "eForensics Magazine",
issn = "2300-6986",

}

RIS

TY - GEN

T1 - Phishing for Data: Digital Forensic Integrity

AU - Medhurst, Rachael

PY - 2019/8/1

Y1 - 2019/8/1

N2 - Phishing is a cybercrime in which a target or targets are contacted by email by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details and passwords’ (Phishing.org, 2019). Unfortunately, businesses andemployees are often the target of phishing emails, which target four appeals,fear, greed, obedience and helpfulness, to enable a successful cyber-attack against the company. The four appeals are utilised because this targets the human element of the employee; for example, if the employee doesn’t complete the requested task then they have not fulfilled their job rolesuccessfully, which brings fear of receiving disciplinary action within the workplace. By the employee completing the task out of fear, this may provide information to the attacker or install malware on their system to enable them to conduct criminal activity.

AB - Phishing is a cybercrime in which a target or targets are contacted by email by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details and passwords’ (Phishing.org, 2019). Unfortunately, businesses andemployees are often the target of phishing emails, which target four appeals,fear, greed, obedience and helpfulness, to enable a successful cyber-attack against the company. The four appeals are utilised because this targets the human element of the employee; for example, if the employee doesn’t complete the requested task then they have not fulfilled their job rolesuccessfully, which brings fear of receiving disciplinary action within the workplace. By the employee completing the task out of fear, this may provide information to the attacker or install malware on their system to enable them to conduct criminal activity.

KW - Digital

KW - Forensics

KW - Investigations

KW - Phishing

KW - Attacks

KW - E-mail

M3 - Article

VL - 08

SP - 37

EP - 44

JO - eForensics Magazine

JF - eForensics Magazine

SN - 2300-6986

ER -

ID: 3482431