Phishing

Phishing in United States

Phishing Definition

Spear Phishing in this legal Encyclopedia
Phishing definition in the Law Dictionary

Phishing in Foreign Legal Encyclopedias

Link Description
Phishing Phishing in the World Legal Encyclopedia.
Phishing Phishing in the European Legal Encyclopedia.
Phishing Phishing in the Asian Legal Encyclopedia.
Phishing Phishing in the UK Legal Encyclopedia.
Phishing Phishing in the Australian Legal Encyclopedia.

Back to Top

Browse the American Encyclopedia of Law for Phishing

Scan Phishing in the appropriate area of law:

Link Description
Phishing Phishing in the Family Law Portal of the American Encyclopedia of Law.
Phishing Phishing in the IP Portal of the American Encyclopedia of Law.
Phishing Phishing in the Commercial Law Portal of the American Encyclopedia of Law.
Phishing Phishing in the Criminal Law Portal of the American Encyclopedia of Law.
Phishing Phishing in the Antritrust Portal of the American Encyclopedia of Law.
Phishing Phishing in the Bankruptcy Law Portal of the American Encyclopedia of Law.
Phishing Phishing in the Constitutional Law Portal of the American Encyclopedia of Law.
Phishing Phishing in the Tax Law Portal of the American Encyclopedia of Law.
Phishing Phishing in the and Finance and Banking Portal of the American Encyclopedia of Law.
Phishing Phishing in the Employment and Labor Portal of the American Encyclopedia of Law.
Phishing Phishing in the Personal Injury and Tort Portal of the American Encyclopedia of Law.
Phishing Phishing in the Environmental Law Portal of the American Encyclopedia of Law.

Browse also by :volume, titles, popular topic, category, life events related to law, case-law, list, outline, Library of Congress Classification and materialBack to Top

Explore other Reference Works

Resource Description
Phishing in the Dictionaries Phishing in our legal dictionaries
Find legal topics Browse topics from the American Encyclopedia of Law
Legal Abbreviations and Acronyms Find the meaning of more than 30.000 legal abbreviations and acronyms
Browse the Legal Thesaurus Find synonyms and related words by area of law (see below)
Metadata Hierarchical collection of data
Legal Maxims Maxims are established principles that jurists use as interpretive tools, invoked more frequently in international law
Legal Answers (Q&A) A community-driven knowledge creation process, of enduring value to a broad audience
“http://lawi.us/phishing. The URI of Phishing (more about URIs)
Phishing related entries Find related entries of Phishing

Back to Top

More Resources

Access Points to the American Encyclopedia of Law

Access to the Encyclopedia is provided by alphabetical arrangement of entries, table of cases, table of laws, briefs and tables of contents.

Legal Thesaurus Dictionary

Because some legal concepts are too complicated to compress to a single word or term, the legal thesaurus dictionary allows the reader to search for groups of terms, including synonyms, antonyms, expanded legal meanings and other terms the reader is likely to use. The resource includes lists, synonym rings , subject categories, taxonomies and a number of schemes.

Legal Indexes

The Index is a collection of entries to allow users to locate information in the Lawi Projects. After write down relevant words and phrases that you need, begin looking up the words and phrases using the index until you have located an applicable subject to review.

Indexes of All Encyclopedias:
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | Z

Index Description
General Index Index of general information about the Encyclopedia
Classified index Headings arranged on the basis of relations among concepts represented by headings, based on the Lawi Classification Scheme
Topical Index A comprehensive and easy guide to the topics of the legal Encyclopedia
Citation Index Index of links between citing and cited entries
Subject Index Identify and describe the subjects of the Encyclopedia
Alphabetical Index A-Z Index of all the Entries
Thematic Index Correlation of terms in a meaningful hierarchical order
Permutation Index A type of index in which significant words in the titles function as subject headings
Browse Index Browse the Encyclopedia by Index
Sitemap Index Sitemap Index, including Taxonomies

Phishing

Overview of Phishing in relation to cyber crime: [1] Phishing emerged as an online form of abusing information systems and defrauding people as the World Wide Web was created and became widely used in the mid-1990s. In 1995–1996 phishing attacks occurred periodically through America Online (AOL). Hackers, posing as AOL administrators, tricked AOL users into revealing their credit card information by telling them that there was a problem with their billing. Phishing attacks against banks and other financial institutions were reported to authorities beginning in 2003. Until that time, many phishing emails were easily recognizable because of their poor grammar and spelling errors. However, phishing quickly became more sophisticated as attackers created more legitimate looking emails and began using other techniques. Today, phishing can occur in several different technical ways, but typically involves a cybercriminal sending a digital message that purports to be from a trusted source organization. This commonly happens when an attacker sends ''spoofed'' (i.e., faked) messages through email or instant messages that appear to be from a legitimate financial institution such as Chase Bank or a popular online retailer such as eBay or Amazon.

Resources

Notes and References

  1. By Ben Woelk

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

Anti-PhishingWorking Group. Web site http://www.antiphishing. org, and, specifically, Phishing activity trends: Report for the month of June 2007, available at http://apwg.org/reports/apwg_report_june_2007.pdf, and Origins of the word 'phishing,' available at http://www.antiphishing.org/word_phish.html; Gartner Group. (2006, November 9). Gartner says number of phishing e-mails sent to U.S. adults nearly doubles in just two years. Gartner.com Web site: http://www.gartner.com/it/page.jsp?id =498245; McQuade, S. (2006). Understanding and Managing Cyber Crime. Boston, MA: Allyn and Bacon; Message Labs. (2007, September). Message Labs Intelligence: September and Q3 in review. A downpour of virus & phishing activity, in the wake of a storm worm surge.'' Available at messagelabs.com Web site: http://www.messagelabs. com/mlireport/MLI_Report_September_Q3_2007.pdf; National Conference of State Legislatures. (2007, February 21). 2007 State legislation relating to ''phishing.'' NCSL Web site: http://www.ncsl.org/programs/lis/phishing07.htm; Richardson, R. (2007). CSI 2007 computer crime and security survey, from http://i.cmpnet.com/v2.gocsi.com /pdf/CSISurvey2007.pdf; U.S. Federal Trade Commission. (2008). OnGuard Online Web site: http://onguardonline.gov/index.html; Washington Post. (2004, November 18). A brief history of phishing. Washington Post Web site: http://www.washingtonpost. com/wp-dyn/articles/A59350-2004Nov18.html.


Posted

in

,

by