Cybersecurity ABCs by Jessica Barker
Author:Jessica Barker [Barker, Jessica]
Language: eng
Format: epub
ISBN: 9781780174242
Publisher: BCS Learning
Published: 2021-04-15T00:00:00+00:00
Anti-phishing
Phishing attacks seem to be the main vector for so many cyberattacks these days, and, as a result, CISOs have to design their behaviour change projects accordingly. As shown in Table 5.2, close to four-fifths of our survey respondents reported that they concentrated on phishing in training either âoftenâ or âconstantlyâ.
Like password usage, phishing is one aspect of information security behaviour where there is relatively more scientific research. One study on phishing in 2017 is noteworthy. An American team led by Carella carried out a user study experiment with 150 university students that aimed to establish an educational standard for anti-phishing campaigns (Carella et al., 2017). Carried out over several weeks, participants received a variety of phishing email simulations and data was gathered on those emails within which they clicked on the links.
Participants were split into three groups that received different levels of anti-phishing training: a control group, which received no training at all; a presentation group, which received an in-class anti-phishing training presentation; and a documents group, who were directed to anti-phishing awareness documentation each time they clicked on a link in a simulated phishing email. Notably, the actual information received by both the presentation group and the documents group was essentially the same, only the manner of its communication differed. As you can probably deduce, the documents group were being treated with a form of positive punishment: they were being given something extra in order to try to decrease a behaviour.
Seven waves of phishing emails were sent out to each of these groups. In the first week, each group performed quite similarly, with click-through rates of over 50 per cent. This is shocking enough in and of itself â before any intervention took place, the participants were highly likely to click through on a link in a phishing email.
In the second week, the presentation group received their in-class anti-phishing training presentation. Thereafter this groupâs click-through rate fell substantially â for a while. In waves 2, 3 and 4, the presentation group performed in the mid-30 per cent range, but by wave 7, the final week, their click-through rate was basically back where it started from, at 50 per cent. By the end of the experiment, the presentation group was performing on anti-phishing detection at the same rate as the control group, who had received no training at all. This kind of rebound may be familiar to anyone whoâs ever carried out cybersecurity workshops in an attempt to change behaviour.
On the other hand, those in the documents group performed very well, with their click-through rates dropping from one week to the next. By the last wave, this group were clicking on a mere 8 per cent of links in phishing emails. Hence this method of phishing training â that is, redirecting to anti-phishing resources after clicking on a phishing link in a simulated attack â appears to have a solid scientific basis and is more effective than a classroom exercise.
However, given what we outlined above regarding the effects of
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Hands-On Cryptography with Python by Samuel Bowne(1336)
Hyperledger Cookbook by Xun (Brian) Wu(1309)
Hands-On IoT Solutions with Blockchain by Maximiliano Santos(1084)
Hands-On Blockchain with Hyperledger by Nitin Gaur(964)
Cryptography: The Key to Digital Security, How It Works, and Why It Matters by Keith Martin(643)
Cryptography by Keith Martin(607)
Hacking Connected Cars : Tactics, Techniques, and Procedures (9781119491736) by Knight Alissa(517)
Simple Steps to Data Encryption by Loshin Peter(492)
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Singh Simon(418)
Foundations of Cryptography: Volume 1, Basic Tools by Oded Goldreich(400)
Tribe of Hackers Security Leaders by Marcus J. Carey & Jennifer Jin(366)
Cyber Warfare – Truth, Tactics, and Strategies by Dr. Chase Cunningham(340)
Quantum Computing for Computer Scientists (9781139634120) by Yanofsky Noson S.; Mannucci Mirco A(309)
Cryptography Apocalypse by Roger A. Grimes(284)
Practical OPNsense: Building Enterprise Firewalls With Open Source by Markus Stubbig(181)
Malware Analyst's Cookbook: Tools and Techniques for Fighting Malicious Code by Ligh Michael & Adair Steven & Hartstein Blake & Richard Matthew(126)
Cybersecurity ABCs by Jessica Barker(118)
Database and Application Security by R. Sarma Danturthi;(114)
CISO Desk Reference Guide Executive Primer by Bonney Hayslip Stamper(101)
