Analysis of the vulnerability of IT system users to a phishing attack

This article presents an analysis of users' vulnerability to phishing attacks. The study was carried out using a self-prepared attack. A phishing attack was carried out on a group of 100 people. The subjects were divided into two groups of 50 people. The first group was attacked from a private,...

Full description

Saved in:
Bibliographic Details
Published inJournal of Computer Sciences Institute Vol. 15; pp. 164 - 167
Main Author Grzebielec, Szymon
Format Journal Article
LanguageEnglish
Published Lublin University of Technology 27.06.2020
Subjects
Online AccessGet full text
ISSN2544-0764
2544-0764
DOI10.35784/jcsi.2049

Cover

Loading…
More Information
Summary:This article presents an analysis of users' vulnerability to phishing attacks. The study was carried out using a self-prepared attack. A phishing attack was carried out on a group of 100 people. The subjects were divided into two groups of 50 people. The first group was attacked from a private, trusted account. The second group was attacked from a foreign email address. The attacked people were asked to complete the survey, its results and conclusions are presented in this article.
ISSN:2544-0764
2544-0764
DOI:10.35784/jcsi.2049