(Continued from Phishing attacks (Penpitcha)
The system can be a quarantine system, detecting if it’s surely phishing. If it’s, it will eliminate the email and the email will never go to eemployee’s inbox. Other emails that are suspicious, the same as the earlier, will not be sent to the employee’s inbox, but be cached and sending some report in a periodically (like an hourly report) to the user of a list of cached email. When the user receives they will review the report (by practices) and which shows up with a score of the chance of being a phishing email, subject, the sender. Then they will retrieve the trustable email to directly send to their inbox. If the decision is wrong, there are another filter to block the phishing email. The second blocked email will be eliminated. The system will help reduce numbers of suspicious emails to review by an employee or to reduce risk exposure.
Reply To: Week 2 Case study 2: Phishing attacks (Anothai)
Home › Forums › TMHG 523 Principles and Foundations of Public Health Informatics 2019 › Week2 Assignment : Peer review Case Study › Week 2 Case study 2: Phishing attacks (Anothai) › Reply To: Week 2 Case study 2: Phishing attacks (Anothai)