[go: up one dir, main page]

Miley, 2023 - Google Patents

Faux Phish: Technical Report

Miley, 2023

View PDF
Document ID
12908870019774098894
Author
Miley B
Publication year

External Links

Snippet

This report provides an in-depth overview of the Faux Phish application developed as part of the BSHCYB4 4th Year Project module. The purpose of this report is to outline and describe the application, its significance, and the process followed for its development. The report …
Continue reading at norma.ncirl.ie (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/041Digitisers, e.g. for touch screens or touch pads, characterized by the transducing means
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/24Editing, e.g. insert/delete
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2203/00Indexing scheme relating to G06F3/00 - G06F3/048

Similar Documents

Publication Publication Date Title
US11749135B2 (en) Secure computer-implemented execution and evaluation of programming assignments for on demand courses
Mudiyanselage et al. Security test MOODLE: A penetration testing case study
Erdoğdu et al. “What about users?”: Development and validation of the mobile information security awareness scale (MISAS)
Weinz et al. The impact of emerging phishing threats: Assessing quishing and llm-generated phishing emails against organizations
Lopes et al. Common techniques, success attack factors and obstacles to social engineering: a systematic literature review
Tin et al. Machine learning based predictive modelling of cybersecurity threats utilising behavioural data
Alalawi Enhancing Cybersecurity Awareness in the United Arab Emirates: An Assessment of Current Practices and the Development of an AI-Enhanced Mobile Application
Badescu Phishing threats in the age of social media: A user-centric approach
Miley Faux Phish: Technical Report
Alevizos et al. Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS)
Fritzen Remote working and cyber security threats in ireland. challenges and prospective solutions
Maleh Traditional Vs Generative AI Pentesting: A Hands-on Approach to Hacking
Eze et al. Cap: Patching the human vulnerability
Napoli Accessible and usable security: Exploring visually impaired users’ online security and privacy strategies
Lehtoniemi Exploring Factors Affecting Ransomware-as-a-Service Proliferation
Parvez The Impact Of Digital Illiteracy On Cybersecurity Vulnerabilities: A Demographic Study In Pakistan
Ciminelli PhiShield: Design and Implementation of a Web Platform for Cybersecurity Awareness Programs
Quyen Hands-on Training for Mitigating Web Application Vulnerabilities
Kucera Cyber security in customer support: needs analysis and training outline
McAnulty Phishing Attacks: A Plan to Educate Employees and Mitigate Risks
Ryan Secure coding in organisations: practice, culture, motivations and
Akacha IMPACT OF COVID-19 ON SECURITY VULNERABILITIES OF LEARNING MANAGEMENT SYSTEMS: A STUDY TOWARDS SECURITY AND SUSTAINABILITY ENHANCEMENT
Shenoy Designing for Trust: Building Mental Models of Security Through Interface Design
Everett et al. Level 1/Level 2 Cambridge National in IT (J836)
Abdullah et al. TryMeOut: A Vulnerability Web Application for Security Students Learning