Phishing for phishing awareness

@article{Jansson2013PhishingFP,  title={Phishing for phishing awareness},  author={Kenny Olof Robert Jansson and Rossouw von Solms},  journal={Behaviour \& Information Technology},  year={2013},  volume={32},  pages={584 - 593},  url={https://api.semanticscholar.org/CorpusID:5472217}}
Whether simulating phishing attacks together with embedded training can contribute towards cultivating users’ resistance towards ‘phishing attacks’ is to be ascertained.

132 Citations

Human Factors in Phishing Attacks: A Systematic Literature Review

A systematic literature review conducted to draw a “big picture” of the most important research works performed on human factors and phishing helps in understanding how human factors should be considered to defend against phishing attacks.

Phishing Attack Awareness Among College Students

An email phishing technique that asked respondents to change their password on an email account was used to find out awareness of phishing attacks on college students and showed that a small percentage of a certain amount of people are still unaware ofphishing attacks and fell into the attacker's trap.

Simulated Phishing Attack and Embedded Training Campaign

An in-depth case study on a large phishing awareness campaign is conducted and it is revealed that phishing Awareness is a learning process through which individuals’ behavior can be strengthened by reinforcement and punishment.

Reinforcing Cybersecurity Awareness through Simulated Phishing Attacks: Findings from an HEI Case Study

Strategic implications for the structuring of cybersecurity education in higher education institutions are envisioned, along with the development of customized, adaptive learning modules that envision to identified skill gaps and strengthen the overall resilience of the digital infrastructure.

Email Phishing Susceptibility in a Public School Setting: Identifying at Risk Educators

Results conclude that the variance in the amount of time spent on the Internet is a factor in the susceptibility of victims to a phishing style attack.

Phishing and Organisational Learning

This paper describes a practical phishing experiment that was conducted at a large organisation and shows how a learning process was initiated and how security incidents such as phishing can be used successfully for both single and double-loop learning.

Spear phishing in a barrel: Insights from a targeted phishing campaign

The results indicate that training users with individual loss messaging might increase the effectiveness of the training, and potential evidence that organizational training can lead to increased overall spear phishing awareness, even for those not directly trained is found.

Influencing Outcomes and Behaviors in Simulated Phishing Exercises

It is found that behavior-based controls were more successful in reducing susceptibility to phishing, primarily when implemented as targeted training that was repeated multiple times.

PHISHING ATTACK

This abstract delves into the diverse tactics employed by cyber criminals, including email spoofing, domain impersonation, and psychological manipulation, to orchestrate successful phishing campaigns, and underscores the critical importance of understanding and mitigating phishing attacks in today's digital landscape.

A Framework to Protect Against Phishing Attacks

A framework to protect againstphishing attacks by enhancing the users' awareness to detect phishing attacks is presented, which has two major components, which are animation videos for training awareness and gamification part to assess the delivered knowledge.
...

25 References

Identity Theft - Empirical evidence from a Phishing Exercise

The findings of this phishing experiment are presented where alarming results on the staff behavior are shown and educational and awareness activities pertaining to email environments are of utmost importance to manage the increased risks of identity theft.

Teaching Johnny not to fall for phish

The results suggest that, while automated detection systems should be used as the first line of defense against phishing attacks, user education offers a complementary approach to help people better recognize fraudulent emails and websites.

The state of phishing

Measuring Resistance to Social Engineering

A real life SE experiment involving 120 participants has been completed and suggests that SE may indeed represent an Achilles heel, and there needs to be a SE resistance metric.

Fostering E-Mail Security Awareness: The West Point Carronade

An e-mail security awareness exercise called the West Point Carronade was designed and developed as a proof-ofconcept response to this need to make sure cadets were practicing good e- Mail security, and was designed to point out this security awareness deficiency.

Social Engineering: Towards A Holistic Solution

This paper is to present guidance in the form of a flowchart which should give employees some guidance on how to act when faced with a potential Social Engineering attack, and should reduce the risk related to Social Engineering significantly.

School of phish: a real-world evaluation of anti-phishing training

Results of this study show that users trained with PhishGuru retain knowledge even after 28 days; adding a second training message to reinforce the original training decreases the likelihood of people giving information to phishing websites; and training does not decrease users' willingness to click on links in legitimate messages.

Social Engineering and its Countermeasures

A taxonomy for classifying social engineering attacks along four dimensions is introduced: who or what the targets are, what media are used, how the attacks fit in an attack cycle, and the techniques used to execute the attacks.

Handbook of Research on Social and Organizational Liabilities in Information Security

The Handbook of Research on Social and Organizational Liabilities in Information Security offers a critical mass of insightful, authoritative articles on the most salient contemporary issues of managing social and human aspects of information security.

Related Papers

Showing 1 through 3 of 0 Related Papers