Professional Documents
Culture Documents
Project Proposal - Phishing Attack - T5CS1105D
Project Proposal - Phishing Attack - T5CS1105D
(PHISHING ATTACK)
T5CDCS1105D
PREPARED BY:
NO NAME ID
1) NURBAITI JANNATI BINTI NUHAIRI 2021209912
2) IRDINA SHAHIRA BINTI INDRA SHAHID 2021496466
3) ADAM MUZAMMIL BIN AHMAD HUMAIZI 2021880622
4) SALMAN AKIF BIN ABDUL SHAHID 2021214676
5) NUR AQMAR DANISH BIN HAKIM 2020882952
PREPARED FOR:
DR. NAJIAHTUL SYAFIQAH BINTI ISMAIL
DATE OF SUBMISSION:
19th NOVEMBER 2023
1
TABLE OF CONTENTS
7.0 SUMMARY...............................................................................................................13
8.0 REFERNCES...........................................................................................................14
1
1.0 MEMBERS PROFILE
Email: 2021209912@student.uitm.edu.my
Email: 2021496466@student.uitm.edu.my
2
Name: Adam Muzammil Bin Ahmad Humaizi
Email:2021880622@student.uitm.edu.my
Email: 2021214676@student.uitm.edu.my
3
Name: NUR AQMAR DANISH BIN HAKIM
Email: akmardanishhakim@gmail.com
4
2.0 PROJECT INTRODUCTION
These days’ reports about cyberattacks are commonplace and refer to any
intentional attempt to compromise, interfere with, or obtain unauthorized access to
computer systems or networks. These assaults use a variety of tactics and
instruments to take advantage of weaknesses in computer systems, and they are
coordinated by individuals, criminal organizations, or state-sponsored agencies.
Monitoring computer systems, networks, and infrastructure resources is essential, as
is using strategies and tools to detect and address data breaches and impending
threats. Phishing is a common strategy used by attackers, making it stand out among
the many cyber security dangers. Phishing is a type of cyberattack that aims to trick
people or organizations into disclosing private information, such as login passwords,
bank account details, or personal data.
5
2.1 PROJECT OBJECTIVE
6
3.0 SELECTED CLASSICAL CRYPTOGRAPHY
For our project, we’re taking a hands-on approach by exploring the practical
application of the Caesar Cipher, a classic encryption method, for both defenders and
attackers. Instead of overwhelming participants with multiple methods, we’re
focusing on the Caesar Cipher as a representative of historical cryptographic
techniques. Defenders will actively utilize the Caesar Cipher to secure information,
gaining practical insights into safeguarding sensitive data. On the offensive side,
attackers, in their simulated role, will employ the Caesar Cipher, providing a realistic
perspective on how this historical encryption method can be used for deceptive
practices. This focused application of the Caesar Cipher ensures a deep and
immersive educational experience, allowing participants to bridge the gap between
historical techniques and modern security challenges. It is crucial to emphasize that
our project strictly adheres to ethical guidelines, maintaining transparency and
responsible engagement throughout the learning process.
7
4.0 PROJECT APPROACHES / PROGRAMMING
LANGUAGE USES
8
3. Implementation: Stage where everything is put into action and begins the full
development process to build the software as outlined by both requirement’s
phase and the system design phase.
5. Deployment: For development projects, this is the stage in which the software
is deployed to the end user. For the other industries, this is when the final
deliverable is launched and delivered to end users.
The Java programming language was selected to build this Caesar cipher due
to its versatility and resilience. Java will be extremely useful in the construction of
the encryption and decryption techniques for this Caesar cipher.
9
Furthermore, Java provides a robust exception-handling mechanism, allowing
developers to handle runtime errors effectively. Robust exception handling can be
used to validate user input, ensuring that the entered key for the Caesar Cipher is
within a valid range. If an invalid key is provided, the program can catch the
exception and prompt the user to enter a valid key. This contributes to the creation
of stable and reliable applications.
10
5.0 PROJECT TIMELINE
Requirement
Analysis
System Design
Implementation
Testing
Deployment
Maintenance
11
6.0 PROJECT RISK AND LIMITATION
Phishing poses substantial risks, with financial loss being a prime concern for
victims. In a typical phishing scenario, a hacker might impersonate a trusted entity,
such as a bank, in an email, phone call, or text message. Unsuspecting targets,
especially those less familiar with technology, may mistake the communication as
genuine. Clicking on embedded links in the deceptive message can grant the hacker
access to sensitive personal information, ranging from bank account details to
passwords. This unauthorized access can lead to financial losses for the victim as the
hacker exploits the acquired information.
While organizations strive to mitigate these risks, one notable limitation lies in
the challenge of balancing stringent security measures with user experience. Overly
complex security protocols may impact user productivity and create resistance to
security practices, highlighting the need to strike a balance between robust
cybersecurity measures and ensuring a seamless user experience. This balancing act
is crucial to fostering a security-conscious culture within organizations without
hindering the daily workflows of users.
12
7.0 SUMMARY
13
8.0 REFERNCES
Hasson, E. (2020, June 17). What is phishing | Attack techniques & scam
examples | Imperva. Learning Center.
https://www.imperva.com/learn/application-security/phishing-attack-scam/
GeeksforGeeks. (2023, May 11). Caesar Cipher in Cryptography.
https://www.geeksforgeeks.org/caesar-cipher-in-cryptography/
Vayansky, I., & Kumar, S. A. (2018). Phishing – challenges and solutions.
Computer Fraud & Security, 2018(1), 15–20. https://doi.org/10.1016/s1361-
3723(18)30007-1
Cameron Mckenzie (2023, March 06). Advantages of Java languange.
https://www.theserverside.com/blog/Coffee-Talk-Java-News-Stories-and-
Opinions/Java
https://www.researchgate.net/publication/359728914_Towards_Web_Phisng
Detection_Limitations_and_Mitigation
14