[go: up one dir, main page]

Nicholson et al., 2017 - Google Patents

Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection

Nicholson et al., 2017

View PDF
Document ID
4271837938963696445
Author
Nicholson J
Coventry L
Briggs P
Publication year
Publication venue
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)

External Links

Snippet

Phishing continues to be a problem for both individuals and organisations, with billions of dollars lost every year. We propose the use of nudges–more specifically social saliency nudges–that aim to highlight important information to the user when evaluating emails. We …
Continue reading at www.usenix.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/585Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities

Similar Documents

Publication Publication Date Title
Nicholson et al. Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection
Butavicius et al. Breaching the human firewall: Social engineering in phishing and spear-phishing emails
Greene et al. User context: an explanatory variable in phishing susceptibility
Parsons et al. The design of phishing studies: Challenges for researchers
Broadhurst et al. Phishing and cybercrime risks in a university student community
Rader et al. Identifying patterns in informal sources of security information
Ferreira et al. An analysis of social engineering principles in effective phishing
Parsons et al. Phishing for the truth: A scenario-based experiment of users’ behavioural response to emails
Bethany et al. Large language model lateral spear phishing: A comparative study in large-scale organizational settings
Akbar Analysing persuasion principles in phishing emails
Steves et al. A phish scale: rating human phishing message detection difficulty
Hassandoust et al. The role of contextualization in individuals’ vulnerability to phishing attempts
Jones et al. Susceptibility to email fraud: A review of psychological perspectives, data-collection methods, and ethical considerations
Gehem et al. Assessing cyber security: A meta analysis of threats, trends, and responses to cyber attacks
Patel et al. Perceptual representation of spam and phishing emails
Alseadoon The impact of users' characteristics on their ability to detect phishing emails
Broadhurst et al. Phishing risks in a university student community
Chan-Tin et al. Predicting phishing victimization: roles of protective and vulnerable strategies and decision-making styles
Liu et al. Understanding the viability of Gmail's origin indicator for identifying the sender
WO2021050990A1 (en) Data analytics tool
Tembe et al. American and indian conceptualizations of phishing
Kyi et al. “I don’t really give them piece of mind”: User Perceptions of Social Engineering Attacks
Ezeji et al. Cyber-related crime in South Africa: extent and perspectives of state’s roleplayers
Chitare et al. “It may take ages”: Understanding Human-Centred Lateral Phishing Attack Detection in Organisations
Marriott Through the net: Investigating how user characteristics influence susceptibility to phishing