Analysis of the vulnerability of IT system users to a phishing attack
This article presents an analysis of users' vulnerability to phishing attacks. The study was carried out using a self-prepared attack. A phishing attack was carried out on a group of 100 people. The subjects were divided into two groups of 50 people. The first group was attacked from a private,...
Saved in:
Published in | Journal of Computer Sciences Institute Vol. 15; pp. 164 - 167 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
Lublin University of Technology
27.06.2020
|
Subjects | |
Online Access | Get full text |
ISSN | 2544-0764 2544-0764 |
DOI | 10.35784/jcsi.2049 |
Cover
Loading…
Summary: | This article presents an analysis of users' vulnerability to phishing attacks. The study was carried out using a self-prepared attack. A phishing attack was carried out on a group of 100 people. The subjects were divided into two groups of 50 people. The first group was attacked from a private, trusted account. The second group was attacked from a foreign email address. The attacked people were asked to complete the survey, its results and conclusions are presented in this article. |
---|---|
ISSN: | 2544-0764 2544-0764 |
DOI: | 10.35784/jcsi.2049 |