Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Introduction Phishing is a form of identity theft in which, in an email, a sender posing as a trustworthy source attempts to acquire private information,

Introduction

Phishing is a form of identity theft in which, in an email, a sender posing as a trustworthy source attempts to acquire private information, such as your user names, passwords, credit card numbers and social security number. Phishing emails claiming to be from popular banks, credit-card companies, auction sites, social networks and online payment services may look quite legitimate. These fraudulent messages often provide links to spoofed (fake) websites where youre asked to enter sensitive information. Visit Security Extra ( www.securityextra.com (Links to an external site.)Links to an external site.), www.snopes.com (Links to an external site.)Links to an external site. and other websites to find lists of the top phishing scams. Also check out the Anti-Phishing Working Group www.antiphishing.org/ (Links to an external site.)Links to an external site. and the FBIs Cyber Investigations website www.fbi.gov/cyberinvest/cyberhome.htm (Links to an external site.)Links to an external site. where youll find information about the latest scams and how to protect yourself.

Objective

In C++, Create a list of 30 words, phrases and company names commonly found in phishing messages. Assign a point value to each based on your estimate of its likeliness to be in a phishing message (e.g., one point if its somewhat likely, two points if moderately likely, or three points if highly likely). Write a program that scans a file of text for these terms and phrases. For each occurrence of a keyword or phrase within the text file, add the assigned point value to the total points for that word or phrase. For each keyword or phrase found, output one line with the word or phrase, the number of occurrences and the point total. Then show the point total for the entire message. Does your program assign a high point total to some actual phishing e-mails youve received? Does it assign a high point total to some legitimate emails youve received?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Building Database Driven Catalogs

Authors: Sherif Danish

1st Edition

0070153078, 978-0070153073

More Books

Students also viewed these Databases questions

Question

Discuss how to conduct an environmental analysis.

Answered: 1 week ago