2015 European Intelligence and Security Informatics Conference 2015
DOI: 10.1109/eisic.2015.38
|View full text |Cite
|
Sign up to set email alerts
|

A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(24 citation statements)
references
References 23 publications
0
23
1
Order By: Relevance
“…Technical prediction systems have been previously proposed in [35] and more recently [36]. The first describes a system which would present users through a series of information security related questions within a web pop-up.…”
Section: Predicting Susceptibility a Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Technical prediction systems have been previously proposed in [35] and more recently [36]. The first describes a system which would present users through a series of information security related questions within a web pop-up.…”
Section: Predicting Susceptibility a Related Workmentioning
confidence: 99%
“…In relation to semantic attack threats, the concept is very new. There is one example specifically for phishing attacks [36]. We argue that the concept can be explored much further and for most semantic attacks, where the human user's situational knowledge can help detect attacks that are otherwise largely undetectable by technical security systems.…”
Section: Human As a Security Sensor (Haass)mentioning
confidence: 99%
“…The extension of this concept, which positions human computer users as physical sensors of cyber attacks, and in this specific case semantic attacks, is relatively new. Stembert et al [10] have recently proposed combining a reporting function with blocking and warning of suspicious emails and the provision of educative tips, so as to harness the intelligence of expert and novice users in detecting email phishing attacks in a corporate environment. Initial experimental results of their mock-up have been encouraging for the applicability of the human as a security sensor concept in this context.…”
Section: Related Workmentioning
confidence: 99%
“…Yet, rather surprisingly the concept is very new in relation to detecting and reporting threats in cyber space. We are aware of only one very recent example of research geared specifically towards phishing attacks (N. Stembert et al, 2015). Here, we take the first steps towards exploring the applicability of the concept more generally by testing the reliability of human users as sensors of security threats.…”
Section: Introductionmentioning
confidence: 99%
“…Also, complementing previous research on predicting whether a particular attacker will be successful in their attack (A. ; S. ), here we identify features and models for predicting whether a particular user will successfully detect an attack. Stembert et al, (2015) have very recently proposed combining a reporting function with blocking and warning of suspicious emails and the provision of educative tips, so as to harness the intelligence of expert and novice users in detecting email phishing attacks in a corporate environment. Initial experimental results of their mock-up have been encouraging for the applicability of the human as a sensor concept in this context.…”
Section: Introductionmentioning
confidence: 99%