翻訳と辞書
Words near each other
・ Phloeocecis
・ Phloeocharinae
・ Phloeodictyidae
・ Phloeograptis
・ Phloeolaemus
・ Phloeomana
・ Phloeomys
・ Phloeomyzinae
・ Phloeopeccania
・ Phloeosinini
・ Phloeospora multimaculans
・ Phloeostichidae
・ Phloeoxena
・ Phish in Hampton
・ Phish tours
Phishing
・ PhishTank
・ Phishy McPhish
・ Phisit Intharathat
・ Phisoderm
・ Phison
・ Phisqa Tira
・ Phisugaon
・ PHIT Act
・ Phitchanat Sakhakon
・ Phiten
・ Phithaya Santawong
・ Phitosia
・ Phitryonus cyanipennis
・ Phitsanulok


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Phishing : ウィキペディア英語版
Phishing

Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.〔Van der Merwe, A J, Loock, M, Dabrowski, M. (2005), Characteristics and Responsibilities involved in a Phishing Attack, Winter International Symposium on Information and Communication Technologies, Cape Town, January 2005.〕 The word is a neologism created as a homophone of ''fishing'' due to the similarity of using fake bait in an attempt to catch a victim. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting victims. Phishing emails may contain links to websites that are infected with malware.〔 Phishing is typically carried out by email spoofing〔(【引用サイトリンク】url=http://googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html )〕 or instant messaging,〔(【引用サイトリンク】title=Phishing and Spamming via IM (SPIM) )〕 and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.
Many websites have now created secondary tools for applications, like maps for games, but they should be clearly marked as to who wrote them, and users should not use the same passwords anywhere on the internet.
Phishing is a continual threat, and the risk is even larger in social media such as Facebook, Twitter, and Google+. Hackers could create a clone of a website and tell you to enter personal information, which is then emailed to them. Hackers commonly take advantage of these sites to attack people using them at their workplace, homes, or in public in order to take personal and security information that can affect the user or company (if in a workplace environment). Phishing takes advantage of the trust that the user may have since the user may not be able to tell that the site being visited, or program being used, is not real; therefore, when this occurs, the hacker has the chance to gain the personal information of the targeted user, such as passwords, usernames, security codes, and credit card numbers, among other things.
==History ==
A phishing technique was described in detail in a paper and presentation delivered to the 1987 International HP Users Group, Interex.
The first recorded mention of the term "phishing" is found in the hacking tool AOHell (according to its creator), which included a function for attempting to steal the passwords or financial details of America Online users.
According to Ghosh, there were "445,004 attacks in 2012 as compared to 258,461 in 2011 and 187,203 in 2010”, showing that phishing has been increasingly threatening individuals.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Phishing」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.