Recommendation ITU-T X.1235 (01/2022) Technologies to counter website spoofing for telecommunication organizations
Summary
History
FOREWORD
Table of Contents
Introduction
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Analysis of website spoofing
     6.1 Website spoofing scenario
     6.2 Characteristics of website spoofing
          6.2.1 Characteristics of spoofed websites
          6.2.2 Characteristics of related activities
     6.3 Consequences
7 Countermeasures
     7.1 Identification
          7.1.1 Similar domain name comparison
          7.1.2 Official logo detection
          7.1.3 Code obfuscation detection
          7.1.4 Credentials input detection
          7.1.5 Third-party security service
          7.1.6 Link analysis
          7.1.7 Final identification based on reputation scoring
     7.2 Protection
8 Mechanism
Appendix I  An example of the mechanism for countering spoofed websites
Appendix II  Examples of technical measures
Bibliography
<\pre>