2021
DOI: 10.1145/3476079
|View full text |Cite
|
Sign up to set email alerts
|

A Case Study of Phishing Incident Response in an Educational Organization

Abstract: Malicious communications aimed at tricking employees are a serious threat for organizations, necessitating the creation of procedures and policies for quickly respond to ongoing attacks. While automated measures provide some protection, they cannot completely protect an organization. In this case study, we use interviews and observations to explore the processes staff at a large University use when handling reports of malicious communication, including how the help desk processes reports, whom they escalate th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
31
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(31 citation statements)
references
References 86 publications
0
31
0
Order By: Relevance
“…A best practice here is to ask users to report suspicious looking email which is then reviewed by help desk staff or a security team [29,34]. The major problem with this approach is scale and time [3,57]. If many users report emails then it takes time to manually review them, which means a slower response time to the attack and a slower response to the people reporting.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A best practice here is to ask users to report suspicious looking email which is then reviewed by help desk staff or a security team [29,34]. The major problem with this approach is scale and time [3,57]. If many users report emails then it takes time to manually review them, which means a slower response time to the attack and a slower response to the people reporting.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, employees are regularly told to report phishing to their organizations' computing support desk or Information Security (IS) teams. However, processing these reports at scale is quite challenging [3]. Problems range from the number of reports to the fact that phishing is specifically designed by attackers to bypass automated filters, making it challenging to automatically extract reliable features.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…The ITIL (IT Infrastructure Library) [2], [10], [22] approach to IT management provides a set of best practices derived from the public and private sectors of various countries. ITIL is a set of rules that describe a systematic approach to IT deployment, implementation, and management.…”
Section: Information Security Toolsmentioning
confidence: 99%
“…Given the likelihood that a large scale phishing campaign will result in some people interacting with it, it is equally likely that other people will identify it. If those people report the phishing quickly, then the organization can take preventive measures like removing it from all staff email inboxes and blocking malicious links using a firewall [4]. In other words, it only takes one person reporting a phishing email to protect a whole organization from it.…”
Section: Introductionmentioning
confidence: 99%