From: Don’t click: towards an effective anti-phishing training. A comparative literature review
Counter-measure | Example | Approach |
---|---|---|
Filtering | [20] | Analyze all incoming email messages and filter them based on their class: phishing or legitimate |
Education of users | [41] | Train employees to protect them from falling victim to phishing attacks and prevent possible information leaks |
Web filtering | [42] | Analyze browsed websites and identify possible phishing sites in order to warn the user or completely block access to the suspected sites |
Website take-downs | [44] | Take down the phishing site to prevent potential victims from accessing such websites (usually by external parties such as LEAs or hosting service providers) |