Abstract
Today’s internet technology is so prevalent that it has improved
the quality of people’s lives in a variety of ways, such as online
social networking and banking. Security risks to systems and networks
are continually evolving because of the development of Internet
technologies. Phishing is one such major issue, in which attackers try
to steal the user’s credentials by using bogus emails, websites, or
both. The creation of solutions to counter phishing attacks is a top
priority for both businesses and academics. Therefore, it is crucial for
businesses to focus on end-user education while preventing phishing
threats. Consequently, our paper’s goal is demonstrate the different
approaches to clone the webpage. We will start by going into great depth
into the background of phishing attacks and the motivation of the
perpetrators. Then, we will give a taxonomy of the many sorts of
phishing.