Diagram 2 - Phishing attack
(diagrams.net Author's work)
This diagram shows how an online criminal can extract confidential information.
1. in the first step, the perpetrator sends a pre-prepared
email. The email, which looks almost identical depending on the source, may be
an email from a bank or other organisation.
2. the user who receives this email clicks on the link
contained in it, which takes them to a web page which, like the email, has been
prepared in advance by the abuser to look almost identical to the original one.
3. the victim tries to log on to the fake website using a
login and password.
4. these dates are saved and sent to the abuser
5. phisher can use just collected credentials to access
original website and withdraw more sensitive data.

Comments
Post a Comment