Comparative Analysis of Phishing Tools on Social Media Sites
Abstract
Social networks, often referred to as social media are a form of information technology development. Social networks are used by society in obtaining information, being a means of long-distance communication, as well as distributing information. However, behind the development of social media which has experienced significant developments, there are problems related to information security. Vulnerable to leakage of credential data and fraud becomes a negative impact due to the development of social media, one of the scams that often occurs on social media is phishing. Such scams are attempts to obtain, steal, or dig into someone's data through emails, text messages, and social media posts. A kun social media is targeted by perpetrators of phishing crimes because the account consists of sensitive data of social media users, one of the social media accounts that can be exposed the phishing attack is Facebook. Therefore, the problem studied in this study is how criminals use three different types of phishing tools to commit crimes. Social media users now understand how phishing works, where criminals use phishing tools to access social media accounts. The data obtained from this study is a comparison of the performance of phishing tools used in committing information crimes on the Facebook social media site, with the existence of these tools that are easy to use for phishing can be a supporting factor for perpetrators of phishing to user accounts freely.
Downloads
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike International License (CC-BY-SA 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Copyright without Restrictions
The journal allows the author(s) to hold the copyright without restrictions and will retain publishing rights without restrictions.
The submitted papers are assumed to contain no proprietary material unprotected by patent or patent application; responsibility for technical content and for protection of proprietary material rests solely with the author(s) and their organizations and is not the responsibility of the ULTIMATICS or its Editorial Staff. The main (first/corresponding) author is responsible for ensuring that the article has been seen and approved by all the other authors. It is the responsibility of the author to obtain all necessary copyright release permissions for the use of any copyrighted materials in the manuscript prior to the submission.