Dissertations / Theses on the topic 'Social engineering attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 29 dissertations / theses for your research on the topic 'Social engineering attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Cerovic, Lazar. "Identifying Resilience Against Social Engineering Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280131.
Full textSociala manipulationer är bland de vanligaste cyber attackerna och bedrägerierna som orsakar enorma ekonomiska skador varje år för individer, företag och myndigheter. Dessa attacker är svåra att skydda ifrån då sociala manipulationer utnyttjar mänskliga svagheter som ett medel till att stjäla pengar eller information. Målet med studien är att identifiera indikatorer av motstånd mot sociala manipulationsattacker, vilket ska göras med hjälp av individuell data, som kan bestå av nätverksinställningar, sociala medieprofiler, webbaktivitet bland annat. Denna studie är baserat på kvalitativa metoder för att samla, analysera och utvärdera data. Motstånd mot social manipulation utvärderas med hjälp av relevanta teorier och modeller som har med beteende och personligheter att göra, sedan används även personlig och demografisk information i utvärderingen. De indikatorer som identifierades var bland annat inställningar i routrar, webbhistorik och social medianvändning. Det teoretiska ramverket som utvecklades för att utvärdera motstånd mot sociala manipulationsattacker kan utökas med fler aspekter av individuell data. Viktiga samhällshändelser och sammanhang kan vara en intressant faktor som är relaterat till ämnet. Framtida studier skulle kunna kombinera detta ramverk med tekniker som maskinlärning och artificiell intelligens.
Jansson, Kenny. "A model for cultivating resistance to social engineering attacks." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1588.
Full textRocha, Flores Waldo. "Shaping information security behaviors related to social engineering attacks." Doctoral thesis, KTH, Elkraftteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186113.
Full textQC 20160503
Nohlberg, Marcus. "Securing Information Assets : Understanding, Measuring and Protecting against Social Engineering Attacks." Doctoral thesis, Kista : Department of Computer and Systems Sciences (together with KTH), Stockholm University, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-8379.
Full textCarlander-Reuterfelt, Gallo Matias. "Estimating human resilience to social engineering attacks through computer configuration data : A literature study on the state of social engineering vulnerabilities." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277921.
Full textSocial Manipulering som attackmetod har blivit ett ökande problem både för företag och individer. Från identitetsstöld till enorma ekonomiska förluster, är denna form av attack känd för att kunna påverka komplexa system, men är ofta i sig mycket enkel i sin form. Medans andra typer av cyberattacker kan skyddas med verktyg som antivirus och antimalware och tillförlitligt hålla privat och konfidentiell information säker så finns det inga motsvarande verktyg för att skydda sig mot Social Manipulering attacker. Det finns alltså inte idag ett pålitligt och säkert sätt att motstå Social Manipulering attacker och skydda personliga uppgifter och privat data. Syftet med denna rapport är att visa olika aspekterna hur datoranvändares data är sårbarhet för dessa typer av attacker, och med dessa utforma ett system som med viss mån av precision kan mäta resiliens mot Social Manipulering. Rapporten är ett resultat av studier av litteratur inom ämnet Social Manipulering och hur den relaterar sig till datorns data, konfiguration och personuppgifter. De olika delarna av utredningen leder var och en till ett mer omfattande sätt att koppla samman de olika uppgifterna och utforma ett rudimentärt sätt att uppskatta en persons resiliens mot Social Manipulering, detta genom att observera olika aspekter av datorns konfiguration. För syftet av rapporten så har uppgifterna varit rimligt tillgängliga, har respekterat integriteten och varit något som lätt kan anpassas från en användare till en annan. Baserat på observationerna av psykologiska data, beteendemönster och nätverkskonfigurationer, så kan vi dra slutsatsen att även om det finns data som stöder möjligheten att uppskatta resiliens, finns det idag inget empiriskt bevisat sätt att göra det på ett exakt sätt. En exempel av modell för att uppskatta resiliens finns i slutet av rapporten. Ramen för detta projekt gjorde det inte möjligt att göra ett praktiskt experiment för att validera teorierna.
Persson, Anders. "Exploring Phishing Attacks and Countermeasures." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3620.
Full textNordgren, Daniella. "Phishing attacks targeting hospitals : A study over phishing knowledge at Blekingesjukhuset." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16681.
Full textYelne, Samir. "Measures of User Interactions, Conversations, and Attacks in a Crowdsourced Platform Offering Emotional Support." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1482330888961028.
Full textSalem, Omran S. A. "An Integrated Intelligent Approach to Enhance the Security Control of IT Systems. A Proactive Approach to Security Control Using Artificial Fuzzy Logic to Strengthen the Authentication Process and Reduce the Risk of Phishing." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/14863.
Full textForde, Edward Steven. "Security Strategies for Hosting Sensitive Information in the Commercial Cloud." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3604.
Full textLindgren, Felix, Oscar Thorslund, and Malin Torstensson. "Vem har högst säkerhetsmedvetenhet? En kvantitativ studie om Social Engineering-attacker och människor på Internet." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-56966.
Full textÖdman, Alina. "Moderna sociala manipuleringsangrepp : En kvalitativ intervjustudie med penetrationstestare." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17303.
Full textOur modern World is filled with information everywhere. Information isconstantly processed, stored and communicated. However,we all know that information usuallyhas some value;therefore,we build secure and complex systems, whichare packed with data. Valuable data. Then we put humans behind those systems and introduce ahuge vulnerability and by that,we are risking our data falling into the wrong hands. Social engineering –it is used to deceive people and letting themgive up sensitive information. This qualitative interview study will attempt to disclose the perception of social engineering from people who perform penetration-testingservices. The results of the study are showing that participators are partially decided of their view of social engineering. They almost all agree that “phishing” is a common attack in bothinternet occurrences and in work-related matters. Furthermore, the conclusion shows that the psychological aspect of social engineering is an important improvement area. Lastly, the participants explain several preventative actions, whichcan be used by organizations and by individuals to minimize the risk of exposure to social engineering.
Johansson, Stina. "Utvecklingen utav social manipulering : En kartläggande granskning av säkerhetsåtgärder 2008 kontra 2018." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17218.
Full textSocial engineers possess the ability to use social interaction as a means of convincing an individual or organization to consent to a specific request. The purpose is to achieve a goal in the form of, for example, financial gain, unauthorized access or service interruption. A social engineering attack is caused by underlying processes and includes a computer-related device for either the social interaction, for the persuasion to consent or for the social engineer's request. The purpose of the thesis was to map security measures against social engineering attacks and thus express the development of the area over time. In other words, the result was expected to express a maturity in the area and contribute with increased insights into how attacks in a timely manner can be tackled in administrative and technical security. A survey was conducted based on a selection based on the three databases; IEEE Xplore Digital Library, Springer Link and DBLP Computer Science Bibliography. Studies were primary and secondary categorized based on a coding process in order to support a narrative analysis. Four primary categories of security measures occurred; modelling, vulnerability assessment, computer systems and (in)direct education. Search strategy and assessment process provided an included data set of a total of 28 studies. Security measures against social manipulation from 2008 were represented by five studies; one proposed modeling, three suggested computer systems and one suggested (in)direct education. Security measures from 2018 were represented by 23 studies; four proposed modeling, two suggested vulnerability assessment; nine proposed computer systems and eight suggested (in)direct education. The coding process also gave rise to secondary categories - all categories were given a dynamic reflection of security measures against social manipulation 2008 versus 2018. Four out of five studies from 2008 defined social manipulation with the absence of theoretical explanations for underlying processes for an attack - and 13 of 23 studies from 2018. The analysis resulted in insights that future research needs to strive for a holistic approach to the underlying processes that cause a social manipulation attack - in this way increased security awareness and resistance to social engineering can be achieved.
Tan, Enhua. "Spam Analysis and Detection for User Generated Content in Online Social Networks." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1365520334.
Full textAhmed, Olfet, and Nawar Saman. "Utvärdering av nätverkssäkerheten på J Bil AB." Thesis, KTH, Data- och elektroteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-123403.
Full textThe aim of this project is to evaluate the network security at J Bil AB. The focus will be on both social and technical issues. For the employees to be able to con-nect to remote servers and external services and perform their daily work tasks, secure connections is needed. J Bil Ab has no IT manager who actively maintains and monitors the network; rather they consult a computer company when changes and implementations are required. The projects’ goal is to identify gaps, come up with suggestions for improvement and to some extent implement so-lutions. To do this, an observation of the employees hav been made, an inter-view have been held, and several attacks on the network have been performed. Based on the data collected, it was concluded that the company has shortcom-ings in IT security. Above all, the social security appeared to have major gaps in it and that is mainly because the lack of knowledge among the employees and they have never been informed of how to manage their passwords, computers and IT issues in general. Suggestions for improvement have been given and some implementations have been performed to eliminate the deficiencies.
(10994988), Minglu Li. "ENVIRONMENTAL FACTORS AFFECT SOCIAL ENGINEERING ATTACKS." Thesis, 2021.
Find full textSocial engineering attacks can have serious consequences when it comes to information security. A social engineering attack aims at sensitive personal information by using personality weaknesses and using manipulation techniques. Because the user is often seen as the weakest link, techniques like phishing, baiting, and vishing, and deception are used to glean important personal information successfully. This article will analyze the relationship between the environment and social engineering attacks. This data consists of 516 people taking a survey. When it comes to discovering the relationship, there are two parts of the analysis. One is a high-dimensional analysis using multiple algorithms to find a connection between the environment and people’s behavior. The other uses a text analysis algorithm to study the pattern of survey questions, which can help discover why certain people have the same tendency in the same scenario. After combining these two, we might show how people have different reactions when dealing with social engineering attacks due to environmental factors.
Chen, Ming-Yen, and 陳銘言. "Analysis of User Behavioral Patterns of Social Engineering Email Attacks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/65478280711994716783.
Full text輔仁大學
資訊管理學系
97
Due to the serious social engineering email attacks, a domestic unit, through education and training, with simulated e-mail attacks and social engineering email attack drills, tries to make the organization's e-mail users to raise awareness in order to reduce the success rate of social engineering email attacks. With the evolution of society and the changes of hacker attacks, how to exercise and make the situation much closer to the actual practices of the attacks, this study simulated the real situation of attacks so that practices not only formality exercises. In this research, we analyzed the psychology vulnerability of social engineering e-mail attack drills by the help of experts. This research used the outcome information of social engineering exercises to do association rule analysis for e-mail types and the types of vulnerability in order to analyze the association of potential acts of users. By this study, we can understand the factors which affect e-mail users by the threat of social engineering attacks. The goal of this research is to enable users to be able to avoid against the social engineering attacks. On the other hand, it can also enable users to more understand all the attack methods so that e-mail social engineering attacks will be able to enhance the alertness of users. In the results of this research, we discover 14 user behavior characteristics, and penetrate the characteristic rules to develop eight kinds of attack patterns on different situations so that the drills can continually improve e-mail content and techniques.
Nien, Ching-hsuan, and 粘敬宣. "The Impact of Social Engineering Attacks on Competent Students in Information Management." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/74955131683232313447.
Full text國立高雄第一科技大學
資訊管理研究所
100
In the age of information explosion, information security has been an issue to every information systems’ users. Generally, organizations would employ anti-attack software in defending hostile attacks by unknown hackers. However, hackers are not only capable of in coding techniques for hostile software, but have social skills such as oral communication, lure, counterfeit identity, greed, and punishment avoidance to defraud or to phish users'' personal and confidential information. This study focus on one of social engineering techniques termed phishing, in which well-developed email-based or Web-based scenarios are used to defraud users of confidential information. In this study, an e-mail with social engineering warning signs attached is distributed unexpectedly to students with information majors, who are supposed to be capable of dealing with the issue of information security, to see whether they would be defrauded. Thus, the experiment units are students rolled in the department of information management in a university. In this study, the experimental students were asked to fill out the personal information in the questionnaires attached with the cautions headline in the email. After the collection of replying emails, we have found the followings: 1. Initially, emails with warning signs do not significantly prevent social engineering attack to target students who are information majors. 2. It is assumed that senior student (junior and senior students) should have more information literacy than junior experimenters (freshmen and sophomore) do. In this experiment, the assumption is confirmed. Senior students could effectively identify social engineering attacks, and provide no personal information. 3. The students, who have been defrauded by social engineering before, would have fewer chance (less than 50%)to be defrauded again by similar social engineering attacks. Finally, how to avoid and prevent social engineering attacks in emails has been explored and analyzed. Alternatives of avoiding being attacks by social engineering are also suggested.
Chen, Wen Chu, and 朱震文. "The Association between Social Engineering attacks and Employee Background: An Example of C Petroleum Company." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/qd5he6.
Full text國立臺北科技大學
管理學院資訊與財金管理EMBA專班
104
Social engineering attacks (Social Engineering), is a use of human weakness, if employees lack of information security knowledge, make it easy for hackers bypass the computer security system protected to get business security by way of talk by phone, email, or counterfeit identity of person, results serious business disruption or loss. This research used data mining to find out the association rules from social engineer attacks and employee background. This study took a petroleum Company, C, as an example and collected drill result as the basis of analysis. After data collection is complete, use WEKA tools for analysis. We found a significant effect of employee background and email social engineering attacks. Results indicates seniority between 15-30 years of age 55 or older employees are opportunities for successful social engineering attack is relatively high, the message subject to new technology or published books more easily induced click, through this thesis provides suggestions to make the organizations people to raise awareness in order to reduce the risk of social engineering attacks.
Jansen, van Rensburg Shandre Kim. "The human in information security : an analysis of social engineering attacks in the greater Tshwane area of Gauteng, South Africa." Thesis, 2017. http://hdl.handle.net/10500/22646.
Full textLin, Wei-kuo, and 林維國. "A Study of Government Agencies in Social Engineering Exercise Based on Attacks from Malicious Email Samples:The Case of A Agency." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/07637738153212041969.
Full text國立中央大學
資訊管理學系碩士在職專班
100
In recent years, information and communication technology (ICT) has developed rapidly in Taiwan. However, information security incidents emerge endlessly. Observing the past incidents in general indicate that not only private enterprises are easy to be invaded by hackers, but government organizations are also victims of “targeted attack.” The main purpose of this kind of attacks is stealing sensitive data not by traditional ways of hacking but by attacking weaknesses in human nature combined with “social engineering.” It perfectly utilizes zero-day attack, in connection with weak aspects of human nature, by skillfully attaching malicious files in e-mail and sending to targeted e-mail boxes. When government users are lured to check out the malicious files, they will lose command ability and hackers can successfully achieve the purpose of gradually infiltrating government organizations. This study took a particular government agency, A, as an example and collected 173 malicious e-mail samples (new/unknown malicious e-mail when attacking) that the agency suffered in 2011 as the basis of analysis. The study, through research design and two analytical processes, extracted deep information and analyzed the information with association rules, and found the attack patterns and characteristics. Furthermore, the study compared the findings with malicious e-mail social engineering exercise in order to improve social engineering exercises and management of malicious e-mail attacks. This study found that A agency was attacked by targeted attacks that conformed with the characteristics of advanced persistent penetration attacks (APT), and most attacks were malicious e-mail social engineering attacks. Facing such attacks, this study suggested A agency should improve its drill program for preventing malicious electronic social engineering attacks; In addition, the study suggests the agency to carefully inspect its “officers” and “the computers used by the officers” and proposes the active defense concept, MFAR (Monitor, Forensics, Analysis, Record), in order to reduce the opportunities of successful invasion.
Van, Rensburg Kim Shandre Jansen. "The human element in information security : an analysis of social engineering attacks in the greater Tshwane area of Gauteng, South Africa." Thesis, 2017. http://hdl.handle.net/10500/22681.
Full textLee, Chun-Cheng, and 李俊成. "Research on the Relationship between Personality Traits and Email Social Engineering Attacks-A Case Study of A Department of Ministry of National Defense." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/e4uv6q.
Full text萬能科技大學
資訊管理研究所在職專班
103
Well-developed network technology today. Let us explore the world faster and easier flow of information. However, security information and communications has fiasco. Especially in recent years to focus on e-mail social engineering hacker attacks. The emergence of such attacks is often difficult to deal with, and cause significant losses. So the information security industry in the relevant protection solutions, for the risk of "person" under attack assessment is an important work, but studies are rare. Our research questions the relationship between personality traits and email that social engineering attack. First, we fully explore the literatures, discuss information security and social engineering on the existing research methods. And the FFM (The Five Factor Model) of psychology in principle, we sent 400 questionnaires to a department of Ministry of National Defense, and the study of social engineering exercise system using social engineering typical classification of e-mail attacks , And for the study of social engineering exercise system using social engineering typical classification of e-mail attacks. After data collection is complete, use SPSS and SmartPLS tools for analysis. We found a significant effect of personality traits and email social engineering attacks. In addition the results could provide academics understand the relationship between personality traits and email social engineering attack. We can recommend and evaluate information security education and training as a safety-related hardware and software information and support measures to build on the practice, in order to prevent that is hacked and risk mitigation. We can recommend and evaluate information security education and training programs and support information security-related hardware and software build on practical measures for the prevention and mitigation of risk by the hack.
Silva, Francisco José Albino Faria Castro e. "Classificação taxonómica dos ataques de Engenharia Social : caracterização da problemática da segurança de informação em Portugal relativamente à Engenharia Social." Master's thesis, 2013. http://hdl.handle.net/10400.14/15690.
Full textNowadays, information is a resource of vital importance. With the need to protect that asset, companies implement mechanisms aimed at ensuring the integrity, confidentiality and information availability. Due to the difficulty of overcoming the technological barriers of security, the attacks have been directed to the human element. The attackers, by applying attack techniques and exploiting human vulnerabilities, among which ingenuity, curiosity and confidence, achieve their objectives. Thus, taking into account the relevance of the problem, this work aims to: identify the level of knowledge of users and IT managers concerning the problem of social engineering in Portugal, as well as the security measures, the mostly used techniques, the main aim of the attacks, concern about training, and finally present a new classification of social engineering attacks. The research involved 393 users who use social networks and 41 information system managers. In order to achieve the objective, the answers to the questionnaires were analysed. Data analysis revealed that: the level of knowledge about the problem of social engineering is low, regarding security measures, it appears that antivirus installation and use of a firewall are the most applied, regarding the attack techniques we found that Phishing and spam-email are the most used, and that the main motive of the attacks is the theft of information, the concern with employee training is not a priority among the companies surveyed, with only 23% promoting training workshops. In order to support the security managers in the development of security policies, we propose a new way of approaching social engineering attacks through the classification of attacks based on the type of approach, between the victim and attacker, direct or indirect. In the direct approach there is no need to use any means of communication, the contact is in person. The indirect approach is accomplished through the use of communication media. In this study, the attack techniques were analysed based on the interdependence between the various techniques, and on the identification of the relationship between techniques and threats.
Cullen, Andrea J., and Lorna Armitage. "The Social Engineering Attack Spiral (SEAS)." 2016. http://hdl.handle.net/10454/10702.
Full textCybercrime is on the increase and attacks are becoming ever more sophisticated. Organisations are investing huge sums of money and vast resources in trying to establish effective and timely countermeasures. This is still a game of catch up, where hackers have the upper hand and potential victims are trying to produce secure systems hardened against what feels like are inevitable future attacks. The focus so far has been on technology and not people and the amount of resource allocated to countermeasures and research into cyber security attacks follows the same trend. This paper adds to the growing body of work looking at social engineering attacks and therefore seeks to redress this imbalance to some extent. The objective is to produce a model for social engineering that provides a better understanding of the attack process such that improved and timely countermeasures can be applied and early interventions implemented.
Fung, Jian-Jun, and 方建鈞. "A Study for Preventing Social Engineering Attack Types." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/39776911866478968649.
Full text清雲科技大學
資訊管理所
100
In recent years, as Web 2.0 gains its popularity, the audio and multimedia effects on the web pages are more diverse, interactive, and abundant. Now, the social networks are hot, such as Facebook, Plurk, Twitter, Free Blog, Xuite, and Yam Blog, and MSN, Yahoo! Messenger, Skype, mobile phones, and emails have their tremendous influences which cannot be neglected. According to the statistic of ComScore company to the end of 2011, there were 794 million people visited Facebook monthly; each person spend 377 minutes, that is more than 6 hours, on social networks. Recently, 165 anti-fraud hotline of National Police Agency has found there were consecutive social network attacking cases. In view of the prosperous of the Internet, the social engineering attacking is derived from the former emails to social networks today. If we do not pay attention to and strengthen the information security management, the information security cases will repeat itself. The influences will be broadened, and the lost and damage is beyond calculation. This research discusses the social engineering attacking related to social networks and compare these information security cases according to case analysis method. Also, we discuss the social engineering attack control measures in international ISO/IEC 27001 information security management standard and combine the standard operation procedure of ISO/IEC TR 18044 information security matters management. By the risk management regulations and guideline of AS/NZS ISO/IEC 31000, we measure the impact and chances of rick, establish complete evaluation and handling procedures, and etc. We hope that the related information security matters can be reduced and stop related social engineering attacking from happening.
Kao, Chi Sheng, and 高啟聖. "An Intrusion Event Initialized From The Email Social Engineering Attack." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/15946594424458300721.
Full text國立臺灣科技大學
管理研究所
102
This study applies the writing method of Harvard case study. The study states the organization implement the security information system and execute the email social engineering test and training but users are still lack awareness of information security. Hackers use an email to invade the internal easily, the case how to solve this problem? How the case balance security and convenience when they manage security information system. This paper contains case content and manual for teachers. This study describe how the user execute the email in detail so the hacker intrude the organization. While the organization implement the security information system, high level managers and staff have different tune, which led to the problem? Why the education and training can’t reach the original goal? The case combine the theory and practice, so the readers can take better action when they encounter similar problems.
Hung, Chia Lung, and 洪嘉隆. "A new attack model and defense suggestion using Social Engineering in instant messaging environment." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/18084735904193783288.
Full text長庚大學
資訊管理學研究所
97
Social engineering is currently one of the most common network attacks. Attackers inveigle users to obtain unauthorized access to the resources due to the negligence of the users. Therefore, this phenomenon has become a vulnerability to the network security. As the growing dependence of users on instant messaging applications, potential threats would increase due to the attacks with social engineering. To prevent this attack, users have been educated not to open the files or check the hyperlinks before their sources have been identified. Consequently, the threats have been considered to weaken gradually. Although the attack model sending a hyperlink directly without any beforehand dialogue has been losing its success, however, attackers may still exploit the characteristics of active interaction inherent in instant messaging, which may still create another effective vulnerability of users. In light of this consideration, this research presents a new attack model: the attacker waits for a period of time before interacting with the victim. Our assumed scenario is that an instant messaging worm sends the inductive message when two normal users are talking to each other. It was expected that this proposed attack model will easily let users click the hyperlink unsuspectingly, as they believe the link contains no malicious intention. This research conducts experiments to observe whether the research expectations are met. The results show that users tended to more click the hyperlink after the initial five messages than those in the scenario where the hyperlink was issued as the first message. On the other hand, the successful rate of the attack had no obvious increase when the number of messages was manipulated with a larger number (fifteen). A possible explanation may be that user trust remains stable after the specified number of interactions.
(9187496), Priyanka Tiwari. "EXPLORING PHISHING SUSCEPTIBILITY ATTRIBUTABLE TO AUTHORITY, URGENCY, RISK PERCEPTION AND HUMAN FACTORS." Thesis, 2020.
Find full textSecurity breaches nowadays are not limited to technological orientation. Research in the information security domain is gradually shifting towards human behavioral orientation toward breaches that target weaknesses arising from human behaviors (Workman et al., 2007). Currently, social engineering breaches are more effective than many technical attacks. In fact, the majority of cyber assaults have a social engineering component. Social Engineering is the art of manipulating human flaws towards a malicious objective (Breda et al., 2017). In the likely future, social engineering will be the most predominant attack vector within cyber security (Breda et al., 2017). Human failures, persuasion and social influences are key elements to understand when considering security behaviors. With the increasing concerns for social engineering and advancements in human factors-based technology, phishing emails are becoming more prevalent in exploiting human factors and external factors. Such factors have been researched upon in pairs, not overall. Till date, there is not much research done to identify the collaborative links between authority, urgency, risk perception and human factors such as personality traits, and knowledge. This study investigates about phishing email characters, external influences, human factors influences, and their collaborative effects.