dc.contributor.author |
Mouton, Francois
|
|
dc.contributor.author |
Teixeira, M
|
|
dc.contributor.author |
Meyer, T
|
|
dc.date.accessioned |
2018-01-04T10:45:58Z |
|
dc.date.available |
2018-01-04T10:45:58Z |
|
dc.date.issued |
2017-11 |
|
dc.identifier.citation |
Mouton, F., Teixeira, M. and Meyer, T. 2017. Benchmarking a mobile implementation of the social engineering prevention training tool. Proceedings of the 16th Information Security South Africa 2017, Johannesburg, South Africa, 23 November 2017, pp. 106-116 |
en_US |
dc.identifier.isbn |
978-1-5386-0544-8 |
|
dc.identifier.uri |
http://pubs.cs.uct.ac.za/archive/00001202/
|
|
dc.identifier.uri |
http://pubs.cs.uct.ac.za/archive/00001202/01/paper_38.pdf
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/9926
|
|
dc.description |
Copyright: 2017 IEEE. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website. Alternatively, the paper may be obtained via the links provided. |
en_US |
dc.description.abstract |
As the nature of information stored digitally be- comes more important and confidential, the security of the systems put in place to protect this information needs to be increased. The human element, however, remains a vulnerability of the system and it is this vulnerability that social engineers attempt to exploit. The Social Engineering Attack Detection Model version 2 (SEADMv2) has been proposed to help people identify malicious social engineering attacks. Prior to this study, the SEADMv2 had not been implemented as a user friendly application or tested with real subjects. This paper describes how the SEADMv2 was implemented as an Android application. This Android application was tested on 20 subjects, to determine whether it reduces the probability of a subject falling victim to a social engineering attack or not. The results indicated that the Android implementation of the SEADMv2 significantly reduced the number of subjects that fell victim to social engineering attacks. The Android application also significantly reduced the number of subjects that fell victim to malicious social engineering attacks, bidirectional communication social engineering attacks and indirect communication social engineering attacks. The Android application did not have a statistically significant effect on harmless scenarios and unidirectional communication social engineering attacks. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE |
en_US |
dc.relation.ispartofseries |
Worklist;19983 |
|
dc.subject |
Android |
en_US |
dc.subject |
Awareness |
en_US |
dc.subject |
Cyber security |
en_US |
dc.subject |
Mobile development |
en_US |
dc.subject |
Social engineering |
en_US |
dc.subject |
Social Engineering Attack Detection Model |
en_US |
dc.subject |
Social Engineering Attack Framework |
en_US |
dc.title |
Benchmarking a mobile implementation of the social engineering prevention training tool |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Mouton, F., Teixeira, M., & Meyer, T. (2017). Benchmarking a mobile implementation of the social engineering prevention training tool. IEEE. http://hdl.handle.net/10204/9926 |
en_ZA |
dc.identifier.chicagocitation |
Mouton, Francois, M Teixeira, and T Meyer. "Benchmarking a mobile implementation of the social engineering prevention training tool." (2017): http://hdl.handle.net/10204/9926 |
en_ZA |
dc.identifier.vancouvercitation |
Mouton F, Teixeira M, Meyer T, Benchmarking a mobile implementation of the social engineering prevention training tool; IEEE; 2017. http://hdl.handle.net/10204/9926 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Mouton, Francois
AU - Teixeira, M
AU - Meyer, T
AB - As the nature of information stored digitally be- comes more important and confidential, the security of the systems put in place to protect this information needs to be increased. The human element, however, remains a vulnerability of the system and it is this vulnerability that social engineers attempt to exploit. The Social Engineering Attack Detection Model version 2 (SEADMv2) has been proposed to help people identify malicious social engineering attacks. Prior to this study, the SEADMv2 had not been implemented as a user friendly application or tested with real subjects. This paper describes how the SEADMv2 was implemented as an Android application. This Android application was tested on 20 subjects, to determine whether it reduces the probability of a subject falling victim to a social engineering attack or not. The results indicated that the Android implementation of the SEADMv2 significantly reduced the number of subjects that fell victim to social engineering attacks. The Android application also significantly reduced the number of subjects that fell victim to malicious social engineering attacks, bidirectional communication social engineering attacks and indirect communication social engineering attacks. The Android application did not have a statistically significant effect on harmless scenarios and unidirectional communication social engineering attacks.
DA - 2017-11
DB - ResearchSpace
DP - CSIR
KW - Android
KW - Awareness
KW - Cyber security
KW - Mobile development
KW - Social engineering
KW - Social Engineering Attack Detection Model
KW - Social Engineering Attack Framework
LK - https://researchspace.csir.co.za
PY - 2017
SM - 978-1-5386-0544-8
T1 - Benchmarking a mobile implementation of the social engineering prevention training tool
TI - Benchmarking a mobile implementation of the social engineering prevention training tool
UR - http://hdl.handle.net/10204/9926
ER -
|
en_ZA |