ResearchSpace

Benchmarking a mobile implementation of the social engineering prevention training tool

Show simple item record

dc.contributor.author Mouton, Francois
dc.contributor.author Teixeira, M
dc.contributor.author Meyer, T
dc.date.accessioned 2018-01-04T10:45:58Z
dc.date.available 2018-01-04T10:45:58Z
dc.date.issued 2017-11
dc.identifier.citation Mouton, F., Teixeira, M. and Meyer, T. 2017. Benchmarking a mobile implementation of the social engineering prevention training tool. Proceedings of the 16th Information Security South Africa 2017, Johannesburg, South Africa, 23 November 2017, pp. 106-116 en_US
dc.identifier.isbn 978-1-5386-0544-8
dc.identifier.uri http://pubs.cs.uct.ac.za/archive/00001202/
dc.identifier.uri http://pubs.cs.uct.ac.za/archive/00001202/01/paper_38.pdf
dc.identifier.uri http://hdl.handle.net/10204/9926
dc.description Copyright: 2017 IEEE. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website. Alternatively, the paper may be obtained via the links provided. en_US
dc.description.abstract As the nature of information stored digitally be- comes more important and confidential, the security of the systems put in place to protect this information needs to be increased. The human element, however, remains a vulnerability of the system and it is this vulnerability that social engineers attempt to exploit. The Social Engineering Attack Detection Model version 2 (SEADMv2) has been proposed to help people identify malicious social engineering attacks. Prior to this study, the SEADMv2 had not been implemented as a user friendly application or tested with real subjects. This paper describes how the SEADMv2 was implemented as an Android application. This Android application was tested on 20 subjects, to determine whether it reduces the probability of a subject falling victim to a social engineering attack or not. The results indicated that the Android implementation of the SEADMv2 significantly reduced the number of subjects that fell victim to social engineering attacks. The Android application also significantly reduced the number of subjects that fell victim to malicious social engineering attacks, bidirectional communication social engineering attacks and indirect communication social engineering attacks. The Android application did not have a statistically significant effect on harmless scenarios and unidirectional communication social engineering attacks. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.relation.ispartofseries Worklist;19983
dc.subject Android en_US
dc.subject Awareness en_US
dc.subject Cyber security en_US
dc.subject Mobile development en_US
dc.subject Social engineering en_US
dc.subject Social Engineering Attack Detection Model en_US
dc.subject Social Engineering Attack Framework en_US
dc.title Benchmarking a mobile implementation of the social engineering prevention training tool en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Mouton, F., Teixeira, M., & Meyer, T. (2017). Benchmarking a mobile implementation of the social engineering prevention training tool. IEEE. http://hdl.handle.net/10204/9926 en_ZA
dc.identifier.chicagocitation Mouton, Francois, M Teixeira, and T Meyer. "Benchmarking a mobile implementation of the social engineering prevention training tool." (2017): http://hdl.handle.net/10204/9926 en_ZA
dc.identifier.vancouvercitation Mouton F, Teixeira M, Meyer T, Benchmarking a mobile implementation of the social engineering prevention training tool; IEEE; 2017. http://hdl.handle.net/10204/9926 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Mouton, Francois AU - Teixeira, M AU - Meyer, T AB - As the nature of information stored digitally be- comes more important and confidential, the security of the systems put in place to protect this information needs to be increased. The human element, however, remains a vulnerability of the system and it is this vulnerability that social engineers attempt to exploit. The Social Engineering Attack Detection Model version 2 (SEADMv2) has been proposed to help people identify malicious social engineering attacks. Prior to this study, the SEADMv2 had not been implemented as a user friendly application or tested with real subjects. This paper describes how the SEADMv2 was implemented as an Android application. This Android application was tested on 20 subjects, to determine whether it reduces the probability of a subject falling victim to a social engineering attack or not. The results indicated that the Android implementation of the SEADMv2 significantly reduced the number of subjects that fell victim to social engineering attacks. The Android application also significantly reduced the number of subjects that fell victim to malicious social engineering attacks, bidirectional communication social engineering attacks and indirect communication social engineering attacks. The Android application did not have a statistically significant effect on harmless scenarios and unidirectional communication social engineering attacks. DA - 2017-11 DB - ResearchSpace DP - CSIR KW - Android KW - Awareness KW - Cyber security KW - Mobile development KW - Social engineering KW - Social Engineering Attack Detection Model KW - Social Engineering Attack Framework LK - https://researchspace.csir.co.za PY - 2017 SM - 978-1-5386-0544-8 T1 - Benchmarking a mobile implementation of the social engineering prevention training tool TI - Benchmarking a mobile implementation of the social engineering prevention training tool UR - http://hdl.handle.net/10204/9926 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record