Miley, 2023 - Google Patents
Faux Phish: Technical ReportMiley, 2023
View PDF- Document ID
- 12908870019774098894
- Author
- Miley B
- Publication year
External Links
Snippet
This report provides an in-depth overview of the Faux Phish application developed as part of the BSHCYB4 4th Year Project module. The purpose of this report is to outline and describe the application, its significance, and the process followed for its development. The report …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/03—Arrangements for converting the position or the displacement of a member into a coded form
- G06F3/041—Digitisers, e.g. for touch screens or touch pads, characterized by the transducing means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/24—Editing, e.g. insert/delete
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3438—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2203/00—Indexing scheme relating to G06F3/00 - G06F3/048
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11749135B2 (en) | Secure computer-implemented execution and evaluation of programming assignments for on demand courses | |
| Mudiyanselage et al. | Security test MOODLE: A penetration testing case study | |
| Erdoğdu et al. | “What about users?”: Development and validation of the mobile information security awareness scale (MISAS) | |
| Weinz et al. | The impact of emerging phishing threats: Assessing quishing and llm-generated phishing emails against organizations | |
| Lopes et al. | Common techniques, success attack factors and obstacles to social engineering: a systematic literature review | |
| Tin et al. | Machine learning based predictive modelling of cybersecurity threats utilising behavioural data | |
| Alalawi | Enhancing Cybersecurity Awareness in the United Arab Emirates: An Assessment of Current Practices and the Development of an AI-Enhanced Mobile Application | |
| Badescu | Phishing threats in the age of social media: A user-centric approach | |
| Miley | Faux Phish: Technical Report | |
| Alevizos et al. | Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS) | |
| Fritzen | Remote working and cyber security threats in ireland. challenges and prospective solutions | |
| Maleh | Traditional Vs Generative AI Pentesting: A Hands-on Approach to Hacking | |
| Eze et al. | Cap: Patching the human vulnerability | |
| Napoli | Accessible and usable security: Exploring visually impaired users’ online security and privacy strategies | |
| Lehtoniemi | Exploring Factors Affecting Ransomware-as-a-Service Proliferation | |
| Parvez | The Impact Of Digital Illiteracy On Cybersecurity Vulnerabilities: A Demographic Study In Pakistan | |
| Ciminelli | PhiShield: Design and Implementation of a Web Platform for Cybersecurity Awareness Programs | |
| Quyen | Hands-on Training for Mitigating Web Application Vulnerabilities | |
| Kucera | Cyber security in customer support: needs analysis and training outline | |
| McAnulty | Phishing Attacks: A Plan to Educate Employees and Mitigate Risks | |
| Ryan | Secure coding in organisations: practice, culture, motivations and | |
| Akacha | IMPACT OF COVID-19 ON SECURITY VULNERABILITIES OF LEARNING MANAGEMENT SYSTEMS: A STUDY TOWARDS SECURITY AND SUSTAINABILITY ENHANCEMENT | |
| Shenoy | Designing for Trust: Building Mental Models of Security Through Interface Design | |
| Everett et al. | Level 1/Level 2 Cambridge National in IT (J836) | |
| Abdullah et al. | TryMeOut: A Vulnerability Web Application for Security Students Learning |