Refer your Friends & Earn Money

Know More

Follow below step and earn Money


Start earning with myassignmenthelpAu now. Signup and earn upto $2000 / Month

Refer More Cancel
Call Back Call Back

24x7 Support Available

To Get the Best Price Chat With Our Experts

chat now

In A Hurry? Get A Callback

Welcome to Live Chat

Welcome to MyAssignmentHelpAU Services, World's leading Academic solutions provider with Millions of Happy Students.



Executive summary

In this study the focus is given on the manner in which phishing attack creates problem in maintaining data security and confidentiality. The study emphasizes on the need of innovating new software in order to prevent stealing of vital information that are confidential for any organization. The three variants of phishing attack are discussed in detail along with an outline of the working procedure of such phishing attack. It can also be recommended that the innovation of new software’s can turn out to be positive effect in improvement of the computer system.

Table of contents

  1. Introduction. 3
  2. Discussing the three variants related to a phishing attack. 3

    Spear Phishing. 3

    Clone Phishing. 3

    Dropbox Phishing. 3

  1. Working procedure of phishing. 4
  2. Threats received by phishing. 4
  3. Summary. 5
  4. References. 6
  1. Introduction

A phishing attack is linked with stealing user data that includes login credentials and improving the card numbers. This procedure goes on when an attacker is trying to get into the trusted entity in stealing data and hacking the computer information.  In this study, the main focus is given on how network attack has increased to a great level in many areas. Increasing of threats occurs which turns out to be a weakness of a particular company in storing relevant data. The various techniques used by the attacker in protecting the data is also given emphasizes. It also discusses the threats that the computer system faces in innovating new procedures for the improvement of the information.

  1. Discussing the three variants related to a phishing attack
  • Spear Phishing

This procedure is considered as an electronic communication scam that is targeted towards a specific system, business and organization. According to Alsharnouby et al. (2015, p.70), many times stealing of data occurs in order to improve the malicious purposes which are avoided by cybercriminals by installing malware software on a computer that are targeted by the attacker. In order to protect the spear phishing attack, the traditional security system is installed for improving and avoiding the attacks that cause a problem.  

  • Clone Phishing

Clone phishing is considered a fraud attack that comes under the procedure of social engineering. Rittenhouse et al. (2016, p.250) opined that clone phishing is targeted based on specific organizations and individuals in order to get identical and original mail from different sources. All emails are spoofed in order to make the organization believe that it has come from the original sender. 

  • Drop box Phishing

Phishing on the concept of Drop box helps in exchanging the unlicensed software for preventing hacking and storing important information from relevant sources. Drop box helps in allowing users to store share and organize information collected from various resources. In order to protect drop box phishing-based attacks on the system, it is necessary to install anti-hacking features for the betterment of the organization in storing information.

  1. Working procedure of phishing

Phishing is considered as a significant problem that involves fraudulent email and websites that prevent revealing private information. Phishing helped people in gaining knowledge about various security measures in order to get information from lost sites. Wu et al. (2016, p.6679) stated that phishes or attackers destroy or exploit to conduct and render mechanism for the improvement of the system and the organization that is not attacked with fraudulent attackers such as phishing which is influenced by malware software. In order to improve the mechanism, new software needs to be made for the improvement and safety of systems in different organizations.

  1. Threats received by phishing

Phishing attacks are at the top of cyber attack challenges for business and healthcare organization. According to Wu et al. (2016, p.605), it is identified that 92% email delivered is from the malware software. This software sometimes prevents phishing attacks to systems in meeting challenges faced by the organization. The threats of avoiding phishing attack include staying aware, running test, quality matters in innovation of a program and credential threats.



Staying aware

As explained by Alsharnouby et al. (2015, p.75) concentrating on conditioning users in order to report questionable emails for better improvement of the system and avoid a threat. 

Running tests

Jensen et al. (2017, p.600) defined that engaging in the phishing simulation is based on active threats. It also focuses on the threats that the business or the organization faces.

Quality matters in innovating programs

For improving the phishing awareness program quality and quantity of products is considered as an important factor.

Credentials threats

This procedure helps in remaining active and avoiding the threat that creates difficulties in extracting data from relevant resources.

Table 1: Threats of phishing attack

(Source: Influenced by Wu et al. 2016, p.6680)

  1. Summary

Phishing is considered as an online identity that aims at stealing information from various resources which are sensitive in its composition. Attackers are employing a large number of technical and spoofing techniques in order to improve the phishing attack and collect relevant information from different sources. In this study, it is seen that the three variants are playing a vital role in improving the systems from getting attacks from unwanted sources

  1. References

Alsharnouby, M., Alaca, F. and Chiasson, S., (2015). Why phishing still works: User strategies for combating phishing attacks. International Journal of Human-Computer Studies, 82, pp.69-82.

Chaudhry, J.A., Chaudhry, S.A. and Rittenhouse, R.G., (2016). Phishing attacks and defenses. International Journal of Security and Its Applications, 10(1), pp.247-256.

Gupta, B.B., Tewari, A., Jain, A.K. and Agrawal, D.P., (2017). Fighting against phishing attacks: state of the art and future challenges. Neural Computing and Applications, 28(12), pp.3629-3654.

Jensen, M.L., Dinger, M., Wright, R.T. and Thatcher, J.B., (2017). Training to mitigate phishing attacks using mindfulness techniques. Journal of Management Information Systems, 34(2), pp.597-626.

Wu, L., Du, X. and Wu, J., (2016). Effective defense schemes for phishing attacks on mobile computing platforms. IEEE Transactions on Vehicular Technology, 65(8), pp.6678-6691.

Wu, M., Miller, R.C. and Garfinkel, S.L., (2016). Do security toolbars actually prevent phishing attacks?. In Proceedings of the SIGCHI conference on Human Factors in computing systems (pp. 601-610). ACM.

MyAssignmenthelpAu | March 23, 2020

MyAssignmentHelpAu provides the ideal service for all your assignment and homework related tasks to be completed within the specified time. We are available round the clock to resolve your academic queries. Comprised of more than 4000 learned experts, we promise to provide well research and top-notch quality assignments. Our assignment writing services is not bound to the countries of Australia and UK rather stretches to USA, UAE , Singapore and Malaysia. We pay scrupulous attention to each assignment and provide services that include assignment help, homework help, case study help, coursework help, dissertation help and CDR Report help. Avail the best my assignment help and services at competitive price. We promise ultimate customer satisfaction.

Smile your way through this tough Semester!
Get our My Assignment Help in Australia order now

MyAssignmentHelp Testimonials

Best Assignment Help in Australia

Earlier I used to mess up with numerous academic tasks and was finding it hard to perform well in all the assignments. But when I came across MyAssignmentHelpAu, I just breathed deep as I got a best platform from where I can get best and most effective assignment help. Experts, at this platform offered the best writing help to me. Thank you MyAssignmentHelpAu

Michel, Adelaide

Best Essay Writing Service in Australia

To me, the assignments are similar to the nuts which are hard to break. To complete all the relevant assignments is just not an easy task. But team of MyassignmentHelpAu helped me with all the assignment related problems. They served finest assignment solutions for my psychology homework. All my queries have been efficiently solved by them.

Jenny, Melbourne

Top Notch Assignment Service

I was confused with the various assignment help websites. It was hard for me to select the one which could provide me better service on my assignment solutions. Then, as per my friend’s suggestion, I tried MyAssignmentHelpAu to avail my humanities assignment. And I am glad to share my experience as they provided me the optimum content at very pocket friendly rates.

John, Adelaide

Best Assignment Help Provider in Australia

Myassignmenthelpau helps me to complete my assignment within three hours. It is one of the top assignment help provider on which everyone can trust blindly. Myassignmenthelpau has a team of well-versed experts that are able to provide quality assignments all over Australia. I am impressed with their services and will contact them again in the future.

Molly Bella, Sydney

Provide Top Quality Assignment Services

I was scared when I was unable to complete my computer science assignment within the deadline. My friend informed me about the Myassignmenthelpau and I avail their services. I am very thankful to them for making my assignment. My professor was so impressed by my assignment and gave me good grades.

Jayden, Melbourne

Pre-eminent Java Assignment Help from Java Wizards

I was quite stuck with one of my complex Java assignments and looked for help at several websites but, no one could understand the requirements well and could not complete this task. However, Myassignmenthelpau did not only agree to take it but delivered it with excellent quality, which bagged me an HD in the course.

Grace, Perth

Matchless Nursing Assignment Help

I must say that Myassignmenthelpau is the only nursing assignment help portal that you can fall back upon. I had totally forgotten about this intricate assignment that I had to submit next morning. They were my only rescuers. I god a wonderfully written paper in just a matter of few hours. Outstanding services! Excellent Writers!

Julia, Brisbane

Nonpareil Portal to Buy Assignment Online

So many of us out there look for buying assignment online, nevertheless, we struggle to find a genuine service provider. My search for an authentic par excellence assignment writer company ended when I found Myassignmenthelpau. You name the subject, and they can help you with its assignments and what’s more an HD score is guaranteed.

Stella, Gold Coast

Other Students are using My Assignment Help, Are you the only one left Behind?

order now