Join the Neopoet online poetry workshop and community to improve as a writer, meet fellow poets, and showcase your work. Sign up, submit your poetry, and get started.

Phishing (Fishing without a rod)

Phishing,
Dangers lurking,
Deceitful bait waiting,
Online predators strike quickly,
Spoofing

Editing stage: 
Content level: 
Not Explicit Content
Opt-in: Neopoet AI will critique your poem.

Comments

The below is a computer-generated response from Neo, Neopoet's computer artificial intelligence:

This poem effectively uses the cinquain form, adhering to the syllable count of 2-4-6-8-2. The use of fishing terminology as a metaphor for online scams, such as "bait" and "strike," is a clever way to illustrate the concept of phishing. However, the poem could benefit from more specific imagery to create a more vivid picture in the reader's mind. For example, instead of "dangers lurking," consider describing what those dangers might look like. Similarly, "online predators strike quickly" could be more impactful with a specific example or description of the action. The last line, "Spoofing," effectively summarizes the theme of the poem, but it might be more powerful if it were tied more directly to the fishing metaphor. Overall, the poem has a strong concept and structure, but could be improved with more detailed imagery.

Please send feedback about Neo (our computer generated critique system) to https://www.neopoet.com/contact

Hello, Clentin,
Very clever, especially after reading your last cinquain!
Thank you,
L

Thought I would do a tongue in cheek poem following my fishing poem.

Thank you

author comment

A well thought out cinquain with much truth. Phishers are everywhere. You have to constantly be aware. Well done.

~RoseBlack~

Thank you, I wanted to do a tongue in check follow up of my fishing poem. You are right today
Scams are daily and increasing in number!

author comment

I don't understand this form of poetry, at least not the mechanics. I understood it but if you don't mind I would like some more information about phishing

The power of our language can and will change the world.
Successively until our languages become one!

A Cinquain starts with a 2 syllable word the 4, 6, 8, the last word. Is a synonym of first word 2 syllables.
The site below will show all types of poetry and poetry related subjects

For poem hit poems and select the type you was to look at.
Good luck

http://www.shadowpoetry.com/

author comment

Here is a lot of info about phishing

An example of a phishing email, disguised as an official email from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by prompting them to "confirm" it at the phisher's website. The email deliberately misspells some words.
Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information[1] or installing malware such as ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.[2] As of 2020, it is the most common type of cybercrime, with the FBI's Internet Crime Complaint Center reporting more incidents of phishing than any other type of computer crime.[3]

The term "phishing" was first recorded in 1995 in the cracking toolkit AOHell, but may have been used earlier in the hacker magazine 2600.[4][5][6] It is a variation of fishing and refers to the use of lures to "fish" for sensitive information.[5][7][8]

Measures to prevent or reduce the impact of phishing attacks include legislation, user education, public awareness, and technical security measures.[9] The importance of phishing awareness has increased in both personal and professional settings, with phishing attacks among businesses rising from 72% to 86% from 2017 to 2020.[10]

Types
Email phishing
Phishing attacks, often delivered via email spam, attempt to trick individuals into giving away sensitive information or login credentials. Most attacks are "bulk attacks" that are not targeted and are instead sent in bulk to a wide audience.[11] The goal of the attacker can vary, with common targets including financial institutions, email and cloud productivity providers, and streaming services.[12] The stolen information or access may be used to steal money, install malware, or spear phish others within the target organization.[5] Compromised streaming service accounts may also be sold on darknet markets.[13]

This type of social engineering attack can involve sending fraud emails or messages that appear to be from a trusted source, such as a bank or government agency. These messages typically redirect to a fake login page where the user is prompted to enter their login credentials.

author comment
(c) Neopoet.com. No copyright is claimed by Neopoet to original member content.