COM007 Cloud And Network Security

Hello, this question is here because we've worked on this and other similar assignments. If you don't know the answer, you can ask us for help. We guarantee an original paper free from Plagiarism.

Order a Similar Paper Order Different Paper

We got you covered for the whole semester.


Phishing e mails can have a social and personal side.

What is the secret to phishing email’s effectiveness?

What makes people fall for it?

What’s the psychology behind this?

It is important to dig deeper than just phishing email scams. Here are some ways to prevent them from happening again.

Although your paper doesn’t need to address the human aspect of the subject, it can be useful background information.

This paper should take Networking into consideration.

Make sure to raise awareness about unlocked public networks that are designed to extract your personal data by redirecting the user to a fake login social media site.



Phishing refers to the act of allowing an attacker to make a user access a fake website. This is done by sending fake emails or other messages, and obtaining all information about the victim, such as name, national security ID and password (Kumar Srikanth, Tejeswini (2016)).

The word “phishing” is derived from the word fish.

Phishing refers to identity theft which shows a fake website that appears to be legitimate in order for the victim to fall into their trap.

This is done to obtain the passwords, information and details of the account as well as the credit card number and username of the victim.

Many anti-phishing programs are available to detect phishing attempts via email and detect content on the websites.

Email phishers are now able to exploit the new software and techniques that exist thanks to digital technology.

This report details e-mail Phishing, the reason why email phishing is effective, and the reasons people fall under email phishing.

Internet is a powerful medium for individuals as well as organizations that conduct online business.

Many companies trade online. The sale of goods or services is also done online (Sankhwar & Pandey 2017).

Internet is vulnerable to identity theft, loss of personal information and financial losses.

The internet’s viability in commercial exchanges is a serious concern.

Phishing is one of many online threats online. This involves impersonating the website to gain access to the user’s private information, including name, national security identification and password.

Phishing is a trap that can be used to steal information from legitimate websites.

This report shows the effectiveness and psychology of email-phishing.


Email phishing happens when hackers lure the user to click the email that looks like it is from a legitimate website. This allows the attacker to gain access to all personal information.

Malicious emails are spreading the phishing scam rapidly.

This occurs when cyber criminals have access to user’s data and network (Al-Alawi (2014)).

This makes email phishing easier.

Email phishing is a growing sector of cybercrime. This is mainly due to the increase in email phishing.

By clicking on the malicious links, the victim falls prey to phishers who can gain access to the user’s details.

() phishing is an identity theft scheme that displays a fake website that appears to be legitimate.


Why email phishing works: Email phishing is successful because end users are not properly prepared.

All users who use the internet must be informed about the attack methods that are being used today for email phishing.

It is important to educate all internet users about the rules of phishing.

Attackers use advanced phishing techniques to target victims and make it more relevant.

It is not known that users can see more than just the contents of an email.

They must keep an eye on different items in the email.

If there have been monetary transactions, recipients should be able to see the sender as well as the contents and context of any email (Ferreira Coventry & Lenzini 2015).

It is important that users do not click on any suspicious links or download attachments that are harmful.

They don’t check whether the emails are authentic.

They fall for email phishing because they don’t verify the authenticity of emails.

You can verify the authenticity of an email by checking it by sending follow-up emails, or texting the sender.

A second reason to make email phishing more successful is the non-use of a secured network and not using anti phishing programs that are readily available (Ferreira Coventry & Lenzini (2015)).

This falls under the technical perspective.

Security measures must be externally added to the network in order for users to use the network.

Attackers will find it easier to attack these networks if the user does away with security measures.

An organized network is more vulnerable to email phishing.

Firewalls can be implemented within a well-structured security program that includes policies that users must follow.

By implementing firewalls, the gateway is more protected from phishing attacks via emails.

People fall for email phishing because of their psychology and reasons (Ekawade Mule & Patkar 2016, 2016).

Email phishing is mostly done via email.

The links sent by phishers are clicked on by the user.

In order to protect the user from being attacked, policies are instilled.

User surfs the web carelessly, falling prey to email phishing.

People are not taught about the phishing emails and fall prey to phishers.

They do not receive adequate training in email phishing awareness.

It is important to educate all users about the dangers and methods of phishing.

The attackers make advance phishing and the attack is highly relevant. Also, attackers personalize social media to make it easier for them.

All internet users should be aware about email phishing (Herath, et al. 2014).

They must also be cautious when browsing the websites.

They must know what they’re looking for, and they should be cautious about the browser they use.

Users do not pay attention to the messages, URLs or links displayed and click the links unknowingly. This leads to falling prey to phishers.

Protection from email Phishing: User should be protected in order to prevent email phishing. (Akinyelu, Adewumi (2014)

The network system that provides the Internet’s incoming and e-mail networks must provide protection.

People fall for phishers because they are not taught about the dangers of email phishing.

They do not receive adequate training in email phishing awareness.

They should all be trained to change passwords and track the location of phishing email messages.

It is important to educate all users about the dangers of phishing (Kathirvalavakumar & Kavitha, 2015).

Attackers use advanced phishing techniques to target victims and make it more relevant.

They can see the entire email, not just the content.

Phishing by email should be known: This should be communicated to internet surfers (Li Wang, Rao, 2016).

They should be educated to raise awareness.

They need to be aware of what links they click on.

The destination is shown at the top of the screen.

This should be checked if they are unsure about the link.

Wardman (2016) reminds users that they must not open any attachments sent to them.

To ensure that IT can check the safety of any attachments, IT should be notified.

They will examine the documents and determine if they are safe to be opened.


Phishing refers to attackers trying to hack victims by sending fake links to their emails so they can access all of their personal details.

It is important that all internet users are educated on the latest methods of email phishing.

Internet is an important medium for both individuals and companies that do online business.

Email phishing is mostly done through email.

The links sent by phishers are clicked on by the user.

Phishing is identity theft. It shows a fake website, which appears to be legitimate.

This is done to obtain the passwords, information and details of the account as well as the credit card number.

In order to protect them against email phishing scams, users should have protection.

The network system of the Internet must provide protection for users. It provides both incoming as well as outgoing networks.


All systems that prevent email phishing should be known by the people.

Everyone must be aware of what they click on and the documents that they open in email.


Research Article Email Phishing detection system using neural network

Research Journal of Information Technology, 6(3): 39-43.

The random forest machine-learning technique was used to classify phishing email.

Journal of Applied Mathematics 2014

Cybercrimes and Computer Forensics: The Impact on Business Climate in Bahrain Status.

Research Journal of Business Management, 8(3). 139-156.

Phishing attacks and their preventions.

Imperial Journal of Interdisciplinary Research, 2 (12).

Principles and techniques of persuasion in the field of social engineering and their application to phishing.

International Conference on Human Aspects of Information Security, Privacy, Trust (pp.

Security services as coping methods: An investigation into user intent to adopt an email authentication system.

Use Neural Network for Efficient Harmful email Identification.

British Journal of Mathematics & Computer Science 7, 58.

Email phishing attack mitigation by server side email addon.

Indian Journal of Science and Technology (9/19).

An Examination of the Calibration & Resolution Skills in Phishing Email Detection.

A Phishing Email Detection Technique Using Machine Learning Techniques (Doctoral dissertation), UNIVERSITY of NEW BRUNSWICK

Comparative Analysis of Anti Phishing Mechanisms: Email Phishing.

International Journal of Advanced Research in Computer Science. 8(3).

Assessing the Gap. Measure the Impact on Organizations of Phishing.

If you don't know the answer to this question, you can ask us for help. We guarantee an original paper free from Plagiarism.

Order a Similar Paper Order Different Paper

You can trust us with any of your assignments. We got you covered for the whole semester. We dedicate one writer to do all your assignments

Leave a Reply

Your email address will not be published. Required fields are marked *