Intensify Cloud Security and Privacy Against Phishing Attacks

Phishing Login
DOI: 10.1149/10701.1387ecst Publication Date: 2022-04-29T17:13:23Z
ABSTRACT
The world of computation has shifted from centralized (client-server, not web-based) to distributed systems during the last three decades. We are now reverting virtual centralization, i.e., Cloud Computing (CC). In computation, location data and processes makes all difference. A person complete control over operations in their computer. On other side, CC involves a vendor providing service upkeep. At same time, client/customer is ignorant where operating or kept. As result, client does influence it doesn't have right do it. When comes security cloud computing, must guarantee level agreements (SLAs) persuade client. SLA define several degrees complexity depending on benefits for comprehend rules place. Phishing social engineering assault that frequently used obtain user information, such as login passwords credit card details. It happens when an attacker poses trustworthy entity tricks victim into opening e-mail, instant message, text message. this research paper, methodology tries identify phishing attack eco-system been explored mentioned. approach here classifies malicious non-malicious URLs.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (0)
CITATIONS (2)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....