MODERN PHISHING ATTACK PROTECTION RESEARCH OF METHODS
Abstract
This article is devoted to such questions as what are phishing attacks, who they are, their different forms and how to avoid them, which concern the whole world. As a solution to the problem, methods to bypass scammers, phishing techniques and characteristics that you need to know, and anti-phishing methods to use and eliminate phishing are recommended.
Keywords
Phishing, phishing attacks, anti-phishing methods, scammers, phishing methods, secure connection, itdefender, Norton anti-phishing, user-friendly interface.
References
- Practical Malware Analysis. Copyright © 2012 by Michael Sikorski and Andrew Honig .
- Ganiyev SK, Karimov MM, Tashev KA " Information security ", "Science and technologies " publishing house , Tashkent 2016 .
- Ganiyev SK, Karimov MM, Tashev KA Information safety . Information and communication systems safety . High students of the educational institution for intended . " Alokachi " 2008 .
- SKGaniyev , AAGaniyev , ZTXhudoykulov . Cyber security basics : education manual . - T.: " Alokachi ", 2020 y.
- Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code, First Edition (2010): Michael Ligh , Steven Adair, Blake Hartstein , and Matthew Richard. ISBN-10: 0470613033, ISBN-13: 978-0470613030. Wiley Publications.
- Malware: Fighting Malicious Code: Ed Skoudis and Lenny Zeltser (2003). ISBN-10: 0131014056, ISBN-13: 978-0131014053. Prentice Hall Publications.
- S.K. Ganiev, Z.T. Khudoykulov, N.B. Nasrullaev. Basic cyber security:
- uchebnoe posobie, -T.: "Neighborhood and family publishing house", 2021. -240 p.
Downloads
Download data is not yet available.