Phishing Attacks and Protection Against Them

Phishing, ransomware and cryptojacking are the main threats to cyber security in recent years. We consider the stages of phishing attacks, examples of such attacks, specifically, attacks using ransomware, malicious PDF files, and banking trojans. The article describes the specifics of phishing email...

Full description

Saved in:
Bibliographic Details
Published in:IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference pp. 425 - 428
Main Authors: Ivanov, Michael A., Kliuchnikova, Bogdana V., Chugunkov, Ilya V., Plaksina, Anna M.
Format: Conference Proceeding
Language:English
Published: IEEE 26.01.2021
Subjects:
ISSN:2376-6565
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Phishing, ransomware and cryptojacking are the main threats to cyber security in recent years. We consider the stages of phishing attacks, examples of such attacks, specifically, attacks using ransomware, malicious PDF files, and banking trojans. The article describes the specifics of phishing emails. Advices on phishing protection are given.
AbstractList Phishing, ransomware and cryptojacking are the main threats to cyber security in recent years. We consider the stages of phishing attacks, examples of such attacks, specifically, attacks using ransomware, malicious PDF files, and banking trojans. The article describes the specifics of phishing emails. Advices on phishing protection are given.
Author Plaksina, Anna M.
Kliuchnikova, Bogdana V.
Ivanov, Michael A.
Chugunkov, Ilya V.
Author_xml – sequence: 1
  givenname: Michael A.
  surname: Ivanov
  fullname: Ivanov, Michael A.
  organization: National Research Nuclear University MEPhI (Moscow Engineering Physics Institute),Department of Computer Systems and Technologies,Moscow,Russia
– sequence: 2
  givenname: Bogdana V.
  surname: Kliuchnikova
  fullname: Kliuchnikova, Bogdana V.
  organization: National Research Nuclear University MEPhI (Moscow Engineering Physics Institute),Department of Computer Systems and Technologies,Moscow,Russia
– sequence: 3
  givenname: Ilya V.
  surname: Chugunkov
  fullname: Chugunkov, Ilya V.
  email: Ilya.V.Chugunkov@ieee.org
  organization: National Research Nuclear University MEPhI (Moscow Engineering Physics Institute),Department of Computer Systems and Technologies,Moscow,Russia
– sequence: 4
  givenname: Anna M.
  surname: Plaksina
  fullname: Plaksina, Anna M.
  email: anneta.plaksina@mail.ru
  organization: National University of Oil and Gas "Gubkin University",Moscow,Russia
BookMark eNotz7tOwzAUgGGDQKItfQKWiJkEn-NbPEZVuUiVqFCZKyc-bgytg-Iw8PYMdPq3T_rn7CoNiRi7B14BcPu4Pq6G9P6TFVhRV8gRKius1lZcsDlorSSXRvNLNkNhdKmVVjdsmfMn5xwRrMF6xh62fcx9TIeimSbXfeXCJV9sx2GibopDKpqDiylPxa6n0y27Du6YaXnugn08rXerl3Lz9vy6ajZlRC6mEoQkMMEH2bnQoWmValsXgrTog_DYBu-RCFzwZFVAz6UIGiSSEdBSLRbs7t-NRLT_HuPJjb_785z4A0kPSBs
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ElConRus51938.2021.9396693
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1665404760
9781665404761
EISSN 2376-6565
EndPage 428
ExternalDocumentID 9396693
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
OCL
RIE
RIL
ID FETCH-LOGICAL-i203t-134e17fdf4cafc27b55bbaff492df3d2bfdd2ee1afde95f2d043f6142e731be83
IEDL.DBID RIE
ISICitedReferencesCount 3
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000669709800096&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 02:42:03 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i203t-134e17fdf4cafc27b55bbaff492df3d2bfdd2ee1afde95f2d043f6142e731be83
PageCount 4
ParticipantIDs ieee_primary_9396693
PublicationCentury 2000
PublicationDate 2021-Jan.-26
PublicationDateYYYYMMDD 2021-01-26
PublicationDate_xml – month: 01
  year: 2021
  text: 2021-Jan.-26
  day: 26
PublicationDecade 2020
PublicationTitle IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference
PublicationTitleAbbrev ElConRus
PublicationYear 2021
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0002219728
Score 1.8438369
Snippet Phishing, ransomware and cryptojacking are the main threats to cyber security in recent years. We consider the stages of phishing attacks, examples of such...
SourceID ieee
SourceType Publisher
StartPage 425
SubjectTerms bankers
Electronic mail
malicious PDF-files
Password
Phishing
Ransomware
social engineering
Software
Trojan horses
trojans
Writing
Title Phishing Attacks and Protection Against Them
URI https://ieeexplore.ieee.org/document/9396693
WOSCitedRecordID wos000669709800096&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB7a4kEvPlrxzR48dtvdZHeTHEtp8VSKKPRWZjOJFnQr7a6_32S7VAUv3kIgIS-YR-b7PoB7kWQZZYShRJWGCWIaKi4xJJSeLMZF0EzXYhNiNpOLhZq3oL_Hwhhj6uIzM_DN-i-f1rryqbKh4s45V7wNbSHEDqu1z6cw5gW0ZMMrGkdqOHkbr4vHaut9FF_ExeJBM8EvJZXakEyP_7eEE-h9I_KC-d7WnELLFGdw9INMsAv9-esunxSMytIj5wMsyA8q62qrIhi94Mo5g4F7Ge89eJ5OnsYPYaOFEK5YxL1ifGJiYckmGq1mIk_TPEdrE8XIcmK5JWLGxGjJqNQyihJunellRvA4N5KfQ6dYF-YCAnQxDEPKMGIqsaScy2ijFDlXWlqp8RK6ft_Ljx3dxbLZ8tXf3ddw6I_WZyVYdgOdclOZWzjQn-Vqu7mr7-gLXiqTNQ
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD7MKagvXjbxbh98XLf2JG2TxzE2Js4xZMLexmmTuIF2snX-fpuuTAVffAuBhNzgXHK-7wO4j3gYqlCRK0gGLicKXMkEuYqEJYvJI2hMCrGJaDgUk4kcVaCxxcJorYviM920zeIvXy2StU2VtSTLnXPJdmA34Bz9DVprm1FBtBJaomQW9T3Z6r51FunzemW9FFvGhX6znOKXlkphSnpH_1vEMdS_MXnOaGttTqCi01M4_EEnWIPGaLbJKDntLLPYeYdSZQdlRb1V6rRfaZ67g07-Nt7r8NLrjjt9t1RDcOfoMasZz7UfGWV4QibBKA6COCZjuERlmMLYKIVa-2SUloFB5XFmcuOLOmJ-rAU7g2q6SPU5OJRHMUgqJA8lN0rmTqPxAmJMJsKIhC6gZvc9_dgQXkzLLV_-3X0H-_3x02A6eBg-XsGBPWabo8DwGqrZcq1vYC_5zOar5W1xX183TJZ8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=IEEE+NW+Russia+Young+Researchers+in+Electrical+and+Electronic+Engineering+Conference&rft.atitle=Phishing+Attacks+and+Protection+Against+Them&rft.au=Ivanov%2C+Michael+A.&rft.au=Kliuchnikova%2C+Bogdana+V.&rft.au=Chugunkov%2C+Ilya+V.&rft.au=Plaksina%2C+Anna+M.&rft.date=2021-01-26&rft.pub=IEEE&rft.eissn=2376-6565&rft.spage=425&rft.epage=428&rft_id=info:doi/10.1109%2FElConRus51938.2021.9396693&rft.externalDocID=9396693