Phishing Training Strategies: Useful or Wasteful?
نویسنده
چکیده
In the security community, it is commonly known that, no matter how well-built your network, humans will always be a weak link. In particular, the classic phishing email attack is still widely used by attackers trying to gain access to an organization’s computing resources. Although phishing may seem simplistic, it can be extremely effective. In a phishing quiz taken by over 19,000 Americans in the last year (2015), Intel found that over 80% fell for at least one phishing email[1]. In its 2013 Data Breach Investigation Report, Verizon found that with just 12 emails, attackers statistically have an almost 100% chance of getting someone to click[2]. Because of this, many security teams pour a huge amount of time and effort into stopping phishing before it reaches the user, but they cannot catch everything. It has become common to give users some level of cybersecurity training to help them recognize and respond appropriately to phishes on their own. However, in any given group, the technical knowledge of its members will vary widely. There are some people who fall for phishes time and time again despite having the same training as everyone else. Unfortunately for companies, these people tend to be management or administrative personnel who are highly connected within the email graph. With that in mind, the goal of this project was to model the spread of a simple phishing attack and examine the pros and cons of extra targeted cybersecurity training within an organization.
منابع مشابه
Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks
Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two...
متن کاملPhishing website detection using weighted feature line embedding
The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. M...
متن کاملDoes Anti-Phishing Training Work?
Phishing attacks exploit users’ inability to distinguish legitimate websites from fake ones. Strategies for combating phishing include the prevention and detection of phishing scams, tools to help users identify phishing websites, and training users not to fall for phish. While a great deal of effort has been devoted to the first two approaches, less research has been done in the area of traini...
متن کاملBreaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails
We examined the influence of three social engineering strategies on users’ judgments of how safe it is to click on a link in an email. The three strategies examined were authority, scarcity and social proof, and the emails were either genuine, phishing or spear-phishing. Of the three strategies, the use of authority was the most effective strategy in convincing users that a link in an email was...
متن کاملExperimental Case Studies for Investigating E-Banking Phishing Intelligent Techniques and Attack Strategies
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value. The problem of social engineering attack is that there is no single solution to eliminate it completely, since it deals largely with the human factor. This is why implementing empirical...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015