ABSTRACT

The chapter points out that in many security attacks, the attackers exploit human weakness to gain access. It continues the discussion by focusing on scams that are designed to trick users into unwittingly helping attackers gain access to computers. The chapter considers a variety of techniques attackers use, and gives guidance on ways to avoid being tricked. Security experts use the term phishing to describe email messages that attempt to lure victims into sending money or revealing personal information that should be kept confidential. Alternatively, the criminal may use the people device at any time to commit cybercrimes. Often, the attachment will contain funny photos, a short video clip, or other content to keep the user distracted while malware is installed on the user's device. Phishing scams send email messages that ask users to pay money or reveal personal information, usually with the promise of large financial gain.