Executive summary
In this study the focus is given on the manner in which phishing attack creates problem in maintaining data security and confidentiality. The study emphasizes on the need of innovating new software in order to prevent stealing of vital information that are confidential for any organization. The three variants of phishing attack are discussed in detail along with an outline of the working procedure of such phishing attack. It can also be recommended that the innovation of new software’s can turn out to be positive effect in improvement of the computer system.
Table of contents
1. Introduction	3
2. Discussing the three variants related to a phishing attack	3
•	Spear Phishing	3
•	Clone Phishing	3
•	Dropbox Phishing	3
3. Working procedure of phishing	4
4. Threats received by phishing	4
5. Summary	5
6. References	6
1. Introduction
A phishing attack is linked with stealing user data that includes login credentials and improving the card numbers. This procedure goes on when an attacker is trying to get into the trusted entity in stealing data and hacking the computer information.  In this study, the main focus is given on how network attack has increased to a great level in many areas. Increasing of threats occurs which turns out to be a weakness of a particular company in storing relevant data. The various techniques used by the attacker in protecting the data is also given emphasizes. It also discusses the threats that the computer system faces in innovating new procedures for the improvement of the information. 

2. Discussing the three variants related to a phishing attack
•	Spear Phishing
This procedure is considered as an electronic communication scam that is targeted towards a specific system, business and organization. According to Alsharnouby et al. (2015, p.70), many times stealing of data occurs in order to improve the malicious purposes which are avoided by cybercriminals by installing malware software on a computer that are targeted by the attacker. In order to protect the spear phishing attack, the traditional security system is installed for improving and avoiding the attacks that cause a problem.   
•	Clone Phishing
Clone phishing is considered a fraud attack that comes under the procedure of social engineering. Rittenhouse et al. (2016, p.250) opined that clone phishing is targeted based on specific organizations and individuals in order to get identical and original mail from different sources. All emails are spoofed in order to make the organization believe that it has come from the original sender.  
•	Drop box Phishing
Phishing on the concept of Drop box helps in exchanging the unlicensed software for preventing hacking and storing important information from relevant sources. Drop box helps in allowing users to store share and organize information collected from various resources. In order to protect drop box phishing-based attacks on the system, it is necessary to install anti-hacking features for the betterment of the organization in storing information.

3. Working procedure of phishing
Phishing is considered as a significant problem that involves fraudulent email and websites that prevent revealing private information. Phishing helped people in gaining knowledge about various security measures in order to get information from lost sites. Wu et al. (2016, p.6679) stated that phishes or attackers destroy or exploit to conduct and render mechanism for the improvement of the system and the organization that is not attacked with fraudulent attackers such as phishing which is influenced by malware software. In order to improve the mechanism, new software needs to be made for the improvement and safety of systems in different organizations. 

4. Threats received by phishing
Phishing attacks are at the top of cyber attack challenges for business and healthcare organization. According to Wu et al. (2016, p.605), it is identified that 92% email delivered is from the malware software. This software sometimes prevents phishing attacks to systems in meeting challenges faced by the organization. The threats of avoiding phishing attack include staying aware, running test, quality matters in innovation of a program and credential threats. 
Threats	Analysis
Staying aware 	As explained by Alsharnouby et al. (2015, p.75) concentrating on conditioning users in order to report questionable emails for better improvement of the system and avoid a threat.  
Running tests 	Jensen et al. (2017, p.600) defined that engaging in the phishing simulation is based on active threats. It also focuses on the threats that the business or the organization faces.
Quality matters in innovating programs 	For improving the phishing awareness program quality and quantity of products is considered as an important factor.
Credentials threats 	This procedure helps in remaining active and avoiding the threat that creates difficulties in extracting data from  

Enjoy big discounts

Get 35% discount on your first order

We have made it easy for you to place an order


WHATSAPP: +1 (209) 260-9257

TWITTER: Our Twitter Page

EMAIL:[email protected]