Diagram 2 - Phishing attack

 





(diagrams.net Author's work)

This diagram shows how an online criminal can extract confidential information.

1. in the first step, the perpetrator sends a pre-prepared email. The email, which looks almost identical depending on the source, may be an email from a bank or other organisation. 

2. the user who receives this email clicks on the link contained in it, which takes them to a web page which, like the email, has been prepared in advance by the abuser to look almost identical to the original one.

3. the victim tries to log on to the fake website using a login and password.

4. these dates are saved and sent to the abuser

5. phisher can use just collected credentials to access original website and withdraw more sensitive data.

Comments

Popular posts from this blog

Survey Analysis: Continued

Software Example

Introduction