2013
DOI: 10.1007/978-3-642-39377-8_22
|View full text |Cite
|
Sign up to set email alerts
|

An Enterprise Anti-phishing Framework

Abstract: Abstract. The objective of this paper is to report back on an organizational framework, which consisted of human, organization and technology (HOT) dimensions in holistically addressing aspects associated with phishing. Most anti-phishing literature studied either focused on technical controls or education in isolation however; education is core to all aspects in the above-mentioned framework. It is evident, from literature, that little work has been conducted on anti-phishing preventative measures in the cont… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 21 publications
(27 reference statements)
0
2
0
Order By: Relevance
“…Although these methods have been shown to be highly effective, they unlikely to ever reach 100% accuracy due to fact that phish are intentionally designed to bypass these technical barriers and deceive endusers. Hence, human judgement is considered an essential part of an organization's overall security posture [23].…”
Section: B Technical Protectionsmentioning
confidence: 99%
“…Although these methods have been shown to be highly effective, they unlikely to ever reach 100% accuracy due to fact that phish are intentionally designed to bypass these technical barriers and deceive endusers. Hence, human judgement is considered an essential part of an organization's overall security posture [23].…”
Section: B Technical Protectionsmentioning
confidence: 99%
“…The prevalence of semantic attacks has resulted in a higher degree of applicability within policies that are integrated in internationally standardised frameworks ( [Calder and Watkins 2010;Ali 2014]). Dedicated Governmental Guidelines have also been proposed in ([GOVUK 2015;CPNI 2013;Calder and Watkins 2014;Jansen and Grance 2011]) as well as detailed methodologies and investigations in guide books and research ([Peltier 2013;Frauenstein and Solms 2013]). The book published by Peltier [2013] offers a comprehensive collation of strategies for implementing secure policy and process for IT governance; combining standards and best practice guidelines for integrating information security across organisational domains i.e.…”
Section: Organisationalmentioning
confidence: 99%