摘要:Phishing has for long now been a social nuisance. It includes various engineering schemes which are used to obtain discrete and important information from its prey by using a trusted component in electronic communication systems. Given its importance, it is a necessity that we study or analyze this scheme in order to generate a solution. Rough set theory from the past three decades has helped us study various systems with incomplete information domains. It has helped us gain invaluable information by in depth analysis of incomplete information systems. Hence, in this paper we analyze and derive results from a Phishing data set, comprising of domains all over the world and also generic domains using rough set theory. We will then scrutinize some of our results and put forth our conclusion