dc.contributor.author |
Jagani, Chirag |
|
dc.contributor.author |
Hirpara, Jignesh |
|
dc.contributor.author |
Khachariya, Haresh |
|
dc.date.accessioned |
2023-05-16T03:32:21Z |
|
dc.date.available |
2023-05-16T03:32:21Z |
|
dc.date.issued |
2012 |
|
dc.identifier.citation |
Jagani,C.,Hirpara,J.& Khachariya,H.(2012).Protect the internet consumer’s identity against attacks by phishers.International Journal of Computer Applications & Information Technology,1(2),10-15 |
en_US |
dc.identifier.issn |
2278-7720 |
|
dc.identifier.uri |
http://10.9.150.37:8080/dspace//handle/atmiyauni/954 |
|
dc.description.abstract |
Can users believe what their browsers tell them? Even
sophisticated web users decide whether or not to trust a server
based on browser cues such as location bar information, SSL icons,
SSL warnings, certificated information and response time. In their
seminal work on Web spoofing, (Felten-1996) showed how, in
1996, a malicious server could forge some of these cues. However,
this work used genuine SSL sessions and Web Technology has
evolved much since 1996. The web has since become the pre eminent medium for electronic service delivery to remote users,
and the security of many commerce, government and an academic
network application critically rests on the assumption that users
can authenticate the servers with which they interact. This situation
raises the question: is the browser-user communication model
today secure enough to warrant this assumption? |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
International Journal of Computer Applications & Information Technology |
en_US |
dc.subject |
swindler |
en_US |
dc.subject |
phishing, |
en_US |
dc.subject |
keylogging |
en_US |
dc.subject |
consumer’s personal identity |
en_US |
dc.subject |
identity theft |
en_US |
dc.title |
Protect the internet consumer’s identity against attacks by phishers |
en_US |
dc.type |
Article |
en_US |