DocumentCode :
147361
Title :
Combatting phishing: A holistic human approach
Author :
Frauenstein, Edwin D. ; Von Solms, Rossouw
Author_Institution :
Sch. of ICT, Nelson Mandela Metropolitan Univ., Port Elizabeth, South Africa
fYear :
2014
fDate :
13-14 Aug. 2014
Firstpage :
1
Lastpage :
10
Abstract :
Phishing continues to remain a lucrative market for cyber criminals, mostly because of the vulnerable human element. Through emails and spoofed-websites, phishers exploit almost any opportunity using major events, considerable financial awards, fake warnings and the trusted reputation of established organizations, as a basis to gain their victims´ trust. For many years, humans have often been referred to as the `weakest link´ towards protecting information. To gain their victims´ trust, phishers continue to use sophisticated looking emails and spoofed websites to trick them, and rely on their victims´ lack of knowledge, lax security behavior and organizations´ inadequate security measures towards protecting itself and their clients. As such, phishing security controls and vulnerabilities can arguably be classified into three main elements namely human factors (H), organizational aspects (O) and technological controls (T). All three of these elements have the common feature of human involvement and as such, security gaps are inevitable. Each element also functions as both security control and security vulnerability. A holistic framework towards combatting phishing is required whereby the human feature in all three of these elements is enhanced by means of a security education, training and awareness programme. This paper discusses the educational factors required to form part of a holistic framework, addressing the HOT elements as well as the relationships between these elements towards combatting phishing. The development of this framework uses the principles of design science to ensure that it is developed with rigor. Furthermore, this paper reports on the verification of the framework.
Keywords :
computer crime; computer science education; human factors; organisational aspects; unsolicited e-mail; HOT elements; ails; awareness programme; cyber criminals; design science principles; educational factors; fake warnings; financial awards; holistic human approach; human factors; lax security behavior; organizational aspects; phishing security controls; security education; security gaps; security training; security vulnerability; spoofed-Web sites; technological controls; trusted reputation; ISO; Lead; Security; Training; COBIT; agency theory; human factors; organizational aspects; phishing; security education training and awareness; social engineering; technological controls; technology acceptance model;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security for South Africa (ISSA), 2014
Conference_Location :
Johannesburg
Print_ISBN :
978-1-4799-3383-9
Type :
conf
DOI :
10.1109/ISSA.2014.6950508
Filename :
6950508
Link To Document :
بازگشت