Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

phishing

Abbreviation(s) and Synonym(s):

None

Definition(s):

  A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.
Source(s):
CNSSI 4009-2015 (IETF RFC 4949 Ver 2)
NIST SP 800-12 Rev. 1 under Phishing (IETF RFC 4949 Ver 2)

  An attack in which the Subscriber is lured (usually through an email) to interact with a counterfeit Verifier/RP and tricked into revealing information that can be used to masquerade as that Subscriber to the real Verifier/RP.
Source(s):
NIST SP 800-63-2 under Phishing [Superseded]

  Tricking individuals into disclosing sensitive personal information by claiming to be a trustworthy entity in an electronic communication (e.g., internet web sites).
Source(s):
NIST SP 800-82 Rev. 2 under Phishing

  Tricking individuals into disclosing sensitive personal information through deceptive computer-based means.
Source(s):
NIST SP 800-150 under Phishing (NIST SP 800-83 Rev. 1)
NIST SP 800-45 Version 2 under Phishing
NIST SP 800-83 Rev. 1 under Phishing

  Deceptive computer-based means to trick individuals into disclosing sensitive personal information.
Source(s):
NIST SP 800-114 under Phishing [Superseded]

  A digital form of social engineering that uses authentic-looking—but bogus—e-mails to request information from users or direct them to a fake Web site that requests information.
Source(s):
NIST SP 800-115 under Phishing

  Using fraudulent e-mails and Web sites that look very similar to the legitimate sources with the intent of committing financial fraud.
Source(s):
NIST SP 800-69 under Phishing

  Using social engineering techniques to trick users into accessing a fake Web site and divulging personal information.
Source(s):
NIST SP 800-44 Version 2 under Phishing

  An attack in which the subscriber is lured (usually through an email) to interact with a counterfeit verifier/RP and tricked into revealing information that can be used to masquerade as that subscriber to the real verifier/RP.
Source(s):
NIST SP 800-63-3 under Phishing