Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

(Phishing Scanner) Java How To Program, Early Objects, Can I get some help writting this program in Java (I understand that the last two questions,

(Phishing Scanner) Java How To Program, Early Objects,

Can I get some help writting this program in Java (I understand that the last two questions, about if the program written matches actual phishing emails or not is something I have to do on my own).

Phishing is a form of identity theft in which in an e-mail, a sender posing as a trustworthy source attempts to acquire private information, such as your user names, passwords, credit-card numbers and social security number. Phishing e-mails claiming claiming to be from popular banks, credit-card companies, auction sites, social networks and online payment services may look quite legitimate. These fraudulant messages often provide links to spoofed (fake) websites where you're asked to enter sensitive information.

Search online for phishing scams. Also check out the Anti-Phishing Working Group (www.anitphishing.org), and the FBI's Cyber Investigation website (www.fbi.gov/about-us/investigate/cyber/cyber), where you'll find information about the latest scams and how to protect yourself.

Create a list of 30 words, phrases and company names commonly found in phishing messages. Assign a point value based on your estimate of its likeliness to be in a phishing message(e.g., one point if it's somewhat likely, two points if moderately likely, or three points if highly likely). Write an application that scans a file of text for these terms and phrases. For each occurence of a keyword or phrase within the text file, add the assigned point value to the total points for that word or phrase. For each keyword or phrase found, output one line with the word or phrase, the number of occurences and the point total. Then show the point total for the entire message. Does your program assign a high point total to some actual phishing e-mails you've received? Does it assign a high point total to some legitimate e-mails you've received?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Technology And Management Computers And Information Processing Systems For Business

Authors: Robert C. Goldstein

1st Edition

0471887374, 978-0471887379

More Books

Students also viewed these Databases questions

Question

Define Trade Mark.

Answered: 1 week ago

Question

What is cost plus pricing ?

Answered: 1 week ago

Question

1. What are the types of wastes that reach water bodies ?

Answered: 1 week ago

Question

LO3 Outline strategic compensation decisions.

Answered: 1 week ago