Essays about: "Email Attacks"

Showing result 1 - 5 of 13 essays containing the words Email Attacks.

  1. 1. Recognizing and Defending Against Phishing Attacks in Large Organizations

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Matay Mayrany; [2023]
    Keywords : Security; Email; Phishing; Social Engineering; Educational Training Programs; Säkerhet; e-post; nätfiske; social teknik; utbildningsprogram;

    Abstract : As technology keeps integrating further into our personal and professional lives, digital security is a growing concern for our individual and public safety. Email phishing is the most common attack vector, often utilized by malicious actors to trick victims into taking irresponsible actions that benefit the attackers. READ MORE

  2. 2. Improving Email Security in Organizations : Solutions and Guidelines

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Axel Andrén; Ghaith Kashlan; Atichoke Nantarat; [2023]
    Keywords : Email Security; Email Awareness; Phishing; Email Attacks; Social Engineering;

    Abstract : Data breaches from email attacks have been an issue since email was first implemented. Common attack methods like phishing are still a threat to organizations to this very day. That is because it never seems to stop evolving and keeps becoming more and more convincing. READ MORE

  3. 3. Phishing detection challenges for private and organizational users : A comparative study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Johan Brandqvist; John Lieberth Nilsson; [2023]
    Keywords : Phishing; detection; challenge; comparison; email;

    Abstract : Email communication has become an indispensable aspect of modern life, enabling rapid and efficient information exchange for individuals and organizations worldwide. However, the rise of phishing attacks poses a significant threat to the security and privacy of email users, with attackers continuously refining their techniques to exploit unsuspecting victims. READ MORE

  4. 4. Designing a solution for automating the management of a capture the flag network

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dalvie Benu; [2023]
    Keywords : Network; Cyber-Security; Web App; Nätverk; cybersäkerhet; webbapp;

    Abstract : Everyday one hears about another cyber attack against a company or state. In 2023 the cost of cyber crime reached 8 trillion USD and is expected to reach 10 trillion in 2025 [1]. It is becoming increasingly clear that cyber security is important in modern society and especially in the IT industry. READ MORE

  5. 5. A Performance Analysis of Intrusion Detection with Snort and Security Information Management

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Christian Thorarensen; [2021]
    Keywords : Snort; Snort 3; PulledPork; IDS; Open Distro for Elasticsearch; ODFE; SIM; SIEM; ET Open; D-ITG;

    Abstract : Network intrusion detection systems (NIDSs) are a major component in cybersecurity and can be implemented with open-source software. Active communities and researchers continue to improve projects and rulesets used for detecting threats to keep up with the rapid development of the internet. READ MORE