Movatterモバイル変換


[0]ホーム

URL:


Furnell, 2005 - Google Patents

Internet threats to end-users: Hunting easy prey

Furnell, 2005

Document ID
6372719012579497389
Author
Furnell S
Publication year
Publication venue
Network Security

External Links

Snippet

Along with overt attacks against organizations and network infrastructure, we are now faced with an increasing range of Internet threats and scams that specifically target the end-user community. The underlying motives for these are typically mischief or money, and in both …
Continue reading atwww.sciencedirect.com (other versions)

Similar Documents

PublicationPublication DateTitle
TuleunAnalysis of cybercrimes, major cyber security attacks and the overall economic impact on Nigeria
ParmarProtecting against spear-phishing
Schiller et al.Botnets: The killer web applications
Jenab et al.Cyber Security Management: A Review.
AdamsLearning the lessons of WannaCry
Wadhwa et al.A Review on Cyber Crime: Major Threats and Solutions.
Rai et al.A study on cyber crimes cyber criminals and major security breaches
Alazab et al.An analysis of the nature of spam as cybercrime
Minnaar'Crackers', cyberattacks and cybersecurity vulnerabilities: the difficulties in combatting the'new'cybercriminals
Broadhurst et al.Cybercrime and online safety in cyberspace
Oreku et al.Cybercrime: concerns, challenges and opportunities
SonowalIntroduction to phishing
FanningMinimizing the cost of malware
FurnellInternet threats to end-users: Hunting easy prey
SärökaariPhishing attacks and mitigation tactics
Chigozie-Okwum et al.Computer forensics investigation; implications for improved cyber security in Nigeria
SawanehCybercrimes: Threats, challenges, awareness, and solutions in Sierra Leone
Bhattacharya et al.Cyber literacy, awareness, and safety of senior citizens: A comprehensive case study of the contemporary landscape
DmitrievaI Know It When I See It: Should Internet Providers Recognize Copyright Violation When They See It?
Halouzka et al.The impact of the Covid-19 pandemic on the evolution of cyber threats
Emm et al.IT threat evolution in Q3 2016
MitrăThe Structure of Cyber Attacks
ReuvidThe Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity
JonesSocial Media and the Effects on the Everyday User
Broadhurst et al.Cybercrime update: trends and developments

[8]ページ先頭

©2009-2025 Movatter.jp