Phishing Cyber Security Threats

. Phishing is a growing threat in the realm of cybersecurity, where cybercriminals use various phishing techniques to steal sensitive information from individuals and organizations. In practice, phishing aims to obtain personal, account, and financial data by impersonating trusted parties through fake emails, websites, text messages, or social media. The term "phishing" comes from the word "fishing" which describes an attempt to lure prey with fake bait. The most common types of phishing include web phishing, email phishing, smishing phishing, scam phishing, blind phishing, whaling phishing, and angler phishing, each with different approaches and targets. Phishing causes losses to individual victims and significantly impacts the information and communication technology profession, including loss of data, reputation, security, time, cost, quality, and trust. An in-depth understanding of the types of phishing, their impacts, and their prevention and countermeasures is essential to protect yourself and your organization from phishing attacks. Therefore, awareness and education about phishing are key in building resilience to this cyber threat. As such, further research and proactive actions are needed to tackle phishing effectively in the ever-evolving digital age.


INTRODUCTION
In the increasingly evolving digital era, threats to cyber security are also increasingly complex and diverse.One of the threats that has become a significant concern is phishing attacks.Phishing is a fraudulent practice carried out online, where cybercriminals use various phishing strategies to steal sensitive information from individuals, organizations, or even government agencies.
Phishing is the act of impersonating a trusted entity, such as a financial institution, technology company, or authority, to obtain personal, account, or financial data from the victim.In practice, the techniques used in phishing are highly sophisticated and often challenging to recognize by less vigilant users.
Understanding the phenomenon of phishing and its prevention efforts cannot be Trisolvena 39 DOI 10.62885/improsci.v2i1.440ignored.Phishing attacks not only result in financial losses for victims, but they can also damage reputations, lose trust, and even compromise the security of individuals and organizations.Therefore, research on phishing is very important to identify attack patterns, analyze their impact, and develop effective prevention strategies.
In this context, this journal aims to provide an in-depth understanding of the phenomenon of phishing, including the types of attacks, the methods used, their impact, and the preventive measures that individuals and organizations can take.Thus, it is hoped that this journal can make a meaningful contribution to efforts to build resilience to phishing threats in the ever-evolving digital era.

METHOD
The methods in manuscript this literature review are : Literature Study: The first step in this study is to conduct a literature study to understand phishing in depth.This involves searching and analyzing scientific articles, books, research reports, and other trusted sources that have studied the topic before.
Case Study Analysis: The research will involve case study analysis of phishing attacks that have occurred before.This will help in understanding how it works the practice of phishing in authentic contexts and the factors that influence its success.
Surveys and Interviews: Online surveys and interviews with relevant respondents will be conducted to collect primary data.The survey will include questions about respondents' understanding of phishing, their experiences dealing with phishing attacks, and the cybersecurity practices they have implemented.
Data Analysis: Data collected from literature studies, case studies, surveys, and interviews will be analyzed qualitatively and quantitatively, depending on the data type obtained.This analysis will help explore important patterns, trends, and findings related to phishing.
Recommendations and Conclusions: Based on the study's findings, recommendations will be compiled for individuals, companies, and other related parties to reduce the risk of falling victim to phishing attacks.The study's conclusion will illustrate the core of the findings obtained and their practical implications in the context of cybersecurity.

Definition of Phishing
Phishing is an attempt to obtain someone's data information using phishing techniques.The data targeted by phishing are personal data (name, age, address), account data (username and password), and financial data (credit card information, bank account).
Trisolvena 40 DOI 10.62885/improsci.v2i1.440 The official term for phishing is "phishing," which comes from the word "fishing."Phishing activities do aim to lure people to voluntarily provide personal information without realizing it.Phishing perpetrators usually appear as authorized parties or institutions, using fake websites or emails that look convincing so that many people are successfully deceived.The information obtained from phishing data can be used to deceive victims or sold to other parties to commit irresponsible acts such as account misuse.
Phishing is done by faking official websites to deceive victims, which can be punished under the ITE Law and the Criminal Code.Various phishing techniques have been developed, such as phishing scams that send links or files modified or contain malware and blind phishing sent via bulk email without any strategy.In professional ethics, phishing is a cybercrime that can significantly harm victims.Therefore, it is imperative to understand the ways of phishing and avoid such attacks by monitoring accounts, not giving out personal data to anyone, and not clicking on suspicious links.
Phishing has a significant impact on the information and communication technology profession.Here are some of the effects that can be identified: The impact of phishing on the information and communication technology profession is significant and can continue at the organizational and industry levels.
Therefore, technicians and information technology professionals need to understand the ways of phishing and avoid such attacks by monitoring accounts, not giving personal data to anyone, and not clicking on suspicious links.

Types of phishing
1. Web Phishing is phishing that uses fake websites to trick victims.Phishing websites are designed to appear similar to legitimate websites and often use similar domain names.
2. Email Phishing is a type of phishing that uses email to trick victims.The fake emails may contain links or files modified to trick the victim.
3. Smishing Phishing: A type of phishing that uses SMS and phone calls to trick victims.4. Phishing Scam: This is a type of phishing scam in which links or files that are modified or contain malware are sent to trick victims and obtain personal information.
5. Blind Phishing: Phishing sent via bulk email without a strategy.6. Whaling: A type of phishing that targets influential individuals or high-ranking officials to obtain sensitive information.
7. Angler Phishing: A type of phishing that targets social media users through private messages (DMs) or malware notifications.
By understanding the types of phishing, you can be more vigilant and protected from phishing attacks.

Loss
Phishing is a cybercrime that provokes victims to voluntarily provide personal data without realizing it.The losses from phishing are significant and can have an impact on financial losses, data losses, and reputational losses.Here are some examples of the disadvantages of phishing: 1. Financial Losses: Phishing can lead to significant financial losses, such as fraud, data theft, or illegal data sales.Phishing victims can become victims of fraud and other online crimes.
2. Data Loss: Phishing can cause significant data loss, such as loss of personal data, account data, and financial data.Data obtained from phishing victims can be used for criminal purposes, such as fraud, theft, or illegal data sales.Thus, phishing losses are very significant and can impact financial losses, data losses, reputational losses, time losses, cost losses, quality losses, trust losses, privacy losses, security losses, and business losses.Therefore, phishing victims need to understand how phishing works and avoid such attacks by monitoring accounts, not giving out personal data to anyone, and not clicking on suspicious links.

Examples of Phishing Cases
Here are examples of phishing cases that are complex and require victim awareness to avoid such attacks: 1. Case 1: Phishing with Fake Emails.The phishers send a fake email that looks like an 1. Data Loss: Phishing can lead to significant data loss, including personal information, passwords, and financial data.Phishing victims can become victims of fraud and other online crimes.2.Reputational Loss: Phishing can damage the reputation of information and communication technology professionals, as phishing victims can become victims of fraud and other online crimes.This impact can continue at the organizational and industry levels.3.Security Losses: Phishing can disrupt the security of information technology systems and applications, leading to significant losses for organizations and individuals.These impacts can be in the form of financial, data, and reputational losses.4. Time Loss: Phishing can cause significant time losses for technicians and information technology professionals, as they have to spend time dealing with phishing attacks and repairing the resulting damage.5. Cost Loss: Phishing can cause significant costs for organizations and individuals, as they must spend money to address phishing attacks, repair damage, and maintain system security.6. Quality Loss: Phishing can lead to a loss of quality for information technology professionals, as phishing victims can become victims of fraud and other online crimes.This impact can continue at the organizational and industry levels.Trisolvena 41 DOI 10.62885/improsci.v2i1.4407. Loss of Trust: Phishing can lead to a loss of trust in information technology professionals, as phishing victims can become victims of fraud and other online crimes.This impact can continue at the organizational and industry levels.
3. Reputational Loss: Phishing can damage the reputation of information and Trisolvena 42 DOI 10.62885/improsci.v2i1.440communication technology professionals, as phishing victims can become victims of fraud and other online crimes.This impact can continue at the organizational and industry levels.4. Time Loss: Phishing can cause significant time losses for technicians and information technology professionals, as they have to spend time dealing with phishing attacks and repairing the resulting damage.5. Cost Loss: Phishing can cause significant cost losses for organizations and individuals, as they must spend money to address phishing attacks, repair damage, and maintain system security.6. Quality Loss: Phishing can lead to a loss of quality for information technology professionals, as phishing victims can become victims of fraud and other online crimes.This impact can continue at the organizational and industry levels.7. Loss of Trust: Phishing can lead to a loss of trust in information technology professionals, as phishing victims can become victims of fraud and other online crimes.This impact can continue at the organizational and industry levels.8. Privacy Loss: Phishing can lead to significant privacy losses, such as personal data loss and online security loss.Phishing victims can become victims of fraud and other online crimes.9. Security Losses: Phishing can lead to significant security losses, such as security system and sensitive data losses.Phishing victims can become victims of fraud and other online crimes.10. Business Losses: Phishing can lead to significant business losses, such as lost sales and reputational losses.Phishing victims can become victims of fraud and other online crimes.