Nicholson et al., 2017 - Google Patents
Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detectionNicholson et al., 2017
View PDF- Document ID
- 4271837938963696445
- Author
- Nicholson J
- Coventry L
- Briggs P
- Publication year
- Publication venue
- Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)
External Links
Snippet
Phishing continues to be a problem for both individuals and organisations, with billions of dollars lost every year. We propose the use of nudges–more specifically social saliency nudges–that aim to highlight important information to the user when evaluating emails. We …
- 238000001514 detection method 0 title abstract description 36
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/585—Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nicholson et al. | Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection | |
Butavicius et al. | Breaching the human firewall: Social engineering in phishing and spear-phishing emails | |
Greene et al. | User context: an explanatory variable in phishing susceptibility | |
Parsons et al. | The design of phishing studies: Challenges for researchers | |
Broadhurst et al. | Phishing and cybercrime risks in a university student community | |
Rader et al. | Identifying patterns in informal sources of security information | |
Ferreira et al. | An analysis of social engineering principles in effective phishing | |
Parsons et al. | Phishing for the truth: A scenario-based experiment of users’ behavioural response to emails | |
Bethany et al. | Large language model lateral spear phishing: A comparative study in large-scale organizational settings | |
Akbar | Analysing persuasion principles in phishing emails | |
Steves et al. | A phish scale: rating human phishing message detection difficulty | |
Hassandoust et al. | The role of contextualization in individuals’ vulnerability to phishing attempts | |
Jones et al. | Susceptibility to email fraud: A review of psychological perspectives, data-collection methods, and ethical considerations | |
Gehem et al. | Assessing cyber security: A meta analysis of threats, trends, and responses to cyber attacks | |
Patel et al. | Perceptual representation of spam and phishing emails | |
Alseadoon | The impact of users' characteristics on their ability to detect phishing emails | |
Broadhurst et al. | Phishing risks in a university student community | |
Chan-Tin et al. | Predicting phishing victimization: roles of protective and vulnerable strategies and decision-making styles | |
Liu et al. | Understanding the viability of Gmail's origin indicator for identifying the sender | |
WO2021050990A1 (en) | Data analytics tool | |
Tembe et al. | American and indian conceptualizations of phishing | |
Kyi et al. | “I don’t really give them piece of mind”: User Perceptions of Social Engineering Attacks | |
Ezeji et al. | Cyber-related crime in South Africa: extent and perspectives of state’s roleplayers | |
Chitare et al. | “It may take ages”: Understanding Human-Centred Lateral Phishing Attack Detection in Organisations | |
Marriott | Through the net: Investigating how user characteristics influence susceptibility to phishing |