Useful Links
Computer Science
Cybersecurity
Phishing
1. Introduction to Phishing
2. Anatomy of a Phishing Attack
3. Types of Phishing Attacks
4. Psychological Manipulation Tactics
5. Technical Mechanisms and Infrastructure
6. Detection and Identification Techniques
7. Prevention and Protection Strategies
8. Impact Assessment and Consequences
9. Legal and Regulatory Framework
Legal and Regulatory Framework
United States Legislation
CAN-SPAM Act
Commercial Email Requirements
Opt-Out Mechanisms
Sender Identification Rules
Enforcement Provisions
Computer Fraud and Abuse Act (CFAA)
Unauthorized Access Provisions
Damage Assessment Criteria
Criminal and Civil Penalties
Wire Fraud Statutes
Electronic Communication Fraud
Interstate Commerce Violations
Identity Theft and Assumption Deterrence Act
Identity Theft Criminalization
Victim Protection Measures
International Regulations
General Data Protection Regulation (GDPR)
Data Protection Principles
Breach Notification Requirements
Individual Rights Protection
Organizational Obligations
Payment Services Directive 2 (PSD2)
Strong Customer Authentication
Payment Security Requirements
Cybersecurity Act (EU)
Cybersecurity Framework
Incident Reporting Requirements
Industry Standards and Compliance
Payment Card Industry Data Security Standard (PCI DSS)
Cardholder Data Protection
Security Assessment Requirements
Compliance Validation Procedures
Health Insurance Portability and Accountability Act (HIPAA)
Protected Health Information Safeguards
Security Rule Requirements
Breach Notification Obligations
Sarbanes-Oxley Act (SOX)
Financial Reporting Controls
Internal Control Requirements
NIST Cybersecurity Framework
Identify Function
Protect Function
Detect Function
Respond Function
Recover Function
Law Enforcement and International Cooperation
Cross-Border Investigation Challenges
Mutual Legal Assistance Treaties (MLATs)
International Cybercrime Cooperation
Phishing Site Takedown Procedures
Criminal Prosecution Efforts
Previous
8. Impact Assessment and Consequences
Go to top
Back to Start
1. Introduction to Phishing