WeChat Mini Program
Old Version Features

Phishing Techniques and Mitigating the Associated Security Risks

International Journal of Network Security & Its Applications(2013)

Cited 7|Views3
Abstract
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure. These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most organizations rely on training to mitigate and reduce risk of non-technical attacks such as social engineering. Organizations lump IA training into small modules that personnel typically rush through because the training programs lack enough depth and creativity to keep a trainee engaged. The key to retaining knowledge is making the information memorable. This paper describes common and emerging attack vectors and how to lower and mitigate the associated risks.
More
Translated text
PDF
Bibtex
AI Read Science
AI Summary
AI Summary is the key point extracted automatically understanding the full text of the paper, including the background, methods, results, conclusions, icons and other key content, so that you can get the outline of the paper at a glance.
Example
Background
Key content
Introduction
Methods
Results
Related work
Fund
Key content
  • Pretraining has recently greatly promoted the development of natural language processing (NLP)
  • We show that M6 outperforms the baselines in multimodal downstream tasks, and the large M6 with 10 parameters can reach a better performance
  • We propose a method called M6 that is able to process information of multiple modalities and perform both single-modal and cross-modal understanding and generation
  • The model is scaled to large model with 10 billion parameters with sophisticated deployment, and the 10 -parameter M6-large is the largest pretrained model in Chinese
  • Experimental results show that our proposed M6 outperforms the baseline in a number of downstream tasks concerning both single modality and multiple modalities We will continue the pretraining of extremely large models by increasing data to explore the limit of its performance
Try using models to generate summary,it takes about 60s
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Related Papers

Phishing—A Cyber Fraud: the Types, Implications and Governance

Mazurina Mohd Ali, Nur Farhana Mohd Zaharon
International Journal of Educational Reform 2024

被引用9

Detection and Binary Classification of Spear-Phishing Emails in Organizations Using a Hybrid Machine Learning Approach

Popoola Favourite Akinwale,Hamid Jahankhani
Advanced Sciences and Technologies for Security ApplicationsArtificial Intelligence in Cyber Security: Impact and Implications 2021

被引用1

Accuracy Comparison of Different Machine Learning Models in Phishing Detection

Anthony Chandra, Gregorius, M. S. John Immanuel,Alexander Agung Santoso Gunawan,Anderies
2022 5th International Conference on Information and Communications Technology (ICOIACT) 2022

被引用0

Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn
Chat Paper

要点】:本文概述了常见的网络钓鱼攻击手段及其相关安全风险的降低与缓解策略,并提出创新性的信息保障(IA)培训方法以增强培训效果。

方法】:通过分析常见和新兴的攻击向量,研究如何降低和缓解与之相关的风险,同时提出通过增强培训内容的深度和创造性来提高培训人员的参与度和知识保留率。

实验】:本文未具体描述实验过程或使用的数据集名称及结果。