Defending against phishing attacks

Valuable information, such as user authentication credentials and personal sensitive information, can be obtained by exploiting vulnerabilities within the user’s understanding of a system, and particularly a lack of understanding of the user interface. As the barrier to exploiting system vulnerabili...

Full description

Bibliographic Details
Main Author: Dong, Xun
Other Authors: Clark, John ; Jacob, Jeremy
Published: University of York 2009
Subjects:
Online Access:http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.550371