Page 51 - Cyber Warnings
P. 51







How to create a phishing attack prevention training?


The phishing attacks are getting more and more sophisticated and it’s quite challenging to
develop a training which would be a good prevention to such an occurrence. Through this
article, we intend to provide some overview how phishing attacks happen, why they may cost
the economy a lot and which strategies to their prevention could be.

Before we pass through all of these, we should try to clarify what the phishing is and how it
works in a practice. For instance, during the previous time – you could easily get an email,
social media post or any other communication message offering you a link to some amazing
webpage.

So commonly, that web link
would lead you somewhere or
nowhere or you would
immediately get a notification
from your anti-malware software
that clicking on that web
destination – you simply
downloaded some virus.

Anyway, whichever option of
these three practical scenarios
occurred, you would get a
trouble because you would
leave your IP address details to
that website. How’s that
possible?

First, every owner of the
website would deal with his
Content Management System
(CMS) being in position to
confirm every IP address that
would call his website from
some browser. It’s getting clear
how non-difficult may be to use
such information to conduct
some skillfully coordinated
hacking attack.

Once having an IP address of a
computer within some

51 Cyber Warnings E-Magazine – May 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   46   47   48   49   50   51   52   53   54   55   56