Types of Phishing

 

 

 

Types of Phishing (Explain a paragraph or 3 to 6 lines for each)
• Phishing through search Engines
• Vishing
• Smishing
• Key logger
• Social Engineering
• Domain spoofing
• Website forgery
• Trojan
• Malware
• Ransomware
• Malvertising
• Spear Phishing
• Session Hijacking
• Content injection
• Link Manipulation
• Whaling
• Email/spam
• Web based delivery

Root Cause or reason for phising (Explain a paragraph or 3 to 6 for each)
• Identity theft
• Financial Gain
• Password harvesting
• Gain recognition
• Exploit security hole
• Brand Tarnishing
• Data theft

Causes of Phising (Explain a paragraph for each)
• Security Flaws
• Weak passwords
• Non secure desktop
• No user awareness
• Weak auth or no MFA
• Access control list
• Software not up to date
• Browser Vulnerabilities
• Open ports and misconfigured services exposed to internet
• Poor endpoint detection

Detection of Phishing (Explain a paragraph for each)
• Domain name detection
• Language Used
• UI Detection
• Signature
• Tools to detect
• Suspicious attachments
• Suspicious links
• Message with sense of urgency
• Awareness creation
• Unbelievable deals and Offers

Prevention of Phising (Explain a paragraph for each)
• Enforcing strong passwords
• Implement MFA
• Creating security awareness programs
• Monitoring open RDP ports
• Hardening conditional access policies
• Security policies
• Avoiding clicking links and attachments
• Spam Guarding
• Install anti virus , anti spam software

Sample Solution

damage done to one another, in order to judge the actions after a war. For example, one cannot simply nuke the terrorist groups throughout the middle-east, because it is not only proportional, it will damage the whole population, an unintended consequence. More importantly, the soldiers must have the right intention in what they are going to achieve, sacrificing the costs to their actions. For example: if soldiers want to execute all prisoners of war, they must do it for the right intention and for a just cause, proportional to the harm done to them. This is supported by Vittola: ‘not always lawful to execute all combatants…we must take account… scale of the injury inflicted by the enemy.’ This is further supported by Frowe approach, which is a lot more moral than Vittola’s view but implies the same agendas: ‘can’t be punished simply for fighting.’ This means one cannot simply punish another because they have been a combatant. They must be treated as humanely as possible. However, the situation is escalated if killing them can lead to peace and security, within the interests of all parties.
Overall, jus in bello suggests in wars, harm can only be used against combatants, never against the innocent. But in the end, the aim is to establish peace and security within the commonwealth. As Vittola’s conclusion: ‘the pursuit of justice for which he fights and the defence of his homeland’ is what nations should be fighting for in wars (Begby et al (2006b), Page 332). Thus, although today’s world has developed, we can see not much different from the modernist accounts on warfare and the traditionists, giving another section of the theory of the just war. Nevertheless, we can still conclude that there cannot be one definitive theory of the just war theory because of its normativity.

This question has been answered.

Get Answer