NORMA eResearch @NCI Library

”Phish Off” – Don’t Get Hooked!: Final Report Document

McDonnell, Sean (2023) ”Phish Off” – Don’t Get Hooked!: Final Report Document. Undergraduate thesis, Dublin, National College of Ireland.

[thumbnail of Bachelor of Science]
PDF (Bachelor of Science)
Download (2MB) | Preview


The purpose of this report is to detail the inspiration, research, goals, planning, technology and strategies of testing for this 4th Year Computing Project. The cyber threat of Phishing is becoming more and more prominent as a danger to the privacy of online users and the integrity of their systems. It is not widely known among the public and therefore many people are not aware that by simply clicking a link from an email, they have released harmful software onto their system. This project aims to develop an interactive application meant to increase user awareness of Phishing through its functionality as well as providing a text list of safety precautions and recommendations of other sources helpful for preventing or avoiding such attacks.

I have researched similar existing tools that provide training for recognising Phishing threats and I believe my application is different and novel in the way the training is set out for the user in the 3 Phishing Games. For example, it is very easy to navigate and not over-saturated with content making it difficult to remember where to access certain functionalities. An example of a similar application for Phishing education is EdApp, which allows you to create a custom phishing training course and provides a comprehensive course library that covers many cyber threats in addition to Phishing (, 2022). I see my application being innovative in that it provides detailed documentation on Phishing and links to external research as well as the interactive Phishing Games, making it a multipurpose application.

We will discuss what inspired the idea for this application, the problems it intends to solve, and the various tools and resources used to bring it to fruition. We will then provide a Use Case Diagram, complete with descriptions and priorities, as well as discuss the different requirements that it should meet, i.e. Data and Environmental. Code snippets and screenshots of the running application will also be provided and described in detail. Testing strategies, tools and results will also be covered.

Lastly, we will give a summary of the strengths and limitations as well as possible actions of how to expand the application in terms of research and functionality.

Item Type: Thesis (Undergraduate)
Ayala-Rivera, Vanessa
Subjects: Q Science > QA Mathematics > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science
Q Science > QA Mathematics > Computer software
T Technology > T Technology (General) > Information Technology > Computer software
Q Science > QA Mathematics > Computer software > Computer Security
T Technology > T Technology (General) > Information Technology > Computer software > Computer Security
Divisions: School of Computing > Bachelor of Science (Honours) in Computing
Depositing User: Tamara Malone
Date Deposited: 23 Aug 2023 17:31
Last Modified: 23 Aug 2023 17:31

Actions (login required)

View Item View Item