Skip to main navigation menu Skip to main content Skip to site footer

MODERN PHISHING ATTACK PROTECTION RESEARCH OF METHODS

Abstract

This article is devoted to such questions as what are phishing attacks, who they are, their different forms and how to avoid them, which concern the whole world. As a solution to the problem, methods to bypass scammers, phishing techniques and characteristics that you need to know, and anti-phishing methods to use and eliminate phishing are recommended.

Keywords

Phishing, phishing attacks, anti-phishing methods, scammers, phishing methods, secure connection, itdefender, Norton anti-phishing, user-friendly interface.

DOWNLOAD PDF CERTIFICATE

References

  1. Practical Malware Analysis. Copyright © 2012 by Michael Sikorski and Andrew Honig .
  2. Ganiyev SK, Karimov MM, Tashev KA " Information security ", "Science and technologies " publishing house , Tashkent 2016 .
  3. Ganiyev SK, Karimov MM, Tashev KA Information safety . Information and communication systems safety . High students of the educational institution for intended . " Alokachi " 2008 .
  4. SKGaniyev , AAGaniyev , ZTXhudoykulov . Cyber security basics : education manual . - T.: " Alokachi ", 2020 y.
  5. Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code, First Edition (2010): Michael Ligh , Steven Adair, Blake Hartstein , and Matthew Richard. ISBN-10: 0470613033, ISBN-13: 978-0470613030. Wiley Publications.
  6. Malware: Fighting Malicious Code: Ed Skoudis and Lenny Zeltser (2003). ISBN-10: 0131014056, ISBN-13: 978-0131014053. Prentice Hall Publications.
  7. S.K. Ganiev, Z.T. Khudoykulov, N.B. Nasrullaev. Basic cyber security:
  8. uchebnoe posobie, -T.: "Neighborhood and family publishing house", 2021. -240 p.

Downloads

Download data is not yet available.