Long lasting effects of awareness training methods on reducing overall cyber security risk

被引:0
|
作者
Pouraimis, Georgios [1 ]
Thanos, Konstantinos-Georgios [2 ]
Grigoriadis, Athanasios [3 ]
Thomopoulos, Stelios [2 ]
机构
[1] Natl Tech Univ Athens, Sch Elect & Comp Engn, 9 Iroon Polytechniou Str, GR-15773 Athens, Greece
[2] Natl Ctr Sci Res Demokritos, Inst Informat & Telecommun, Integrated Syst Lab, Athens 15310, Greece
[3] Hellenic Natl Def Gen Staff, Mesogeion 227-231, Athens 15561, Greece
基金
欧盟地平线“2020”;
关键词
cybersecurity; phishing; awareness training; social engineering; risk assessment;
D O I
10.1117/12.2518934
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Social Engineering holds one of the most critical threats to public and private organizations. In this paper we focus on phishing threats by measuring the positive impact that awareness methods may provide to them in a long-term period to companies and public bodies. The assessment criterion uses two phishing attacks in a period of 18 weeks. The phishing attack comprises a hook mail containing a link to a credentials harvesting website. Users' reaction and user agent fingerprints are used in order to calculate a risk score for each victim. By applying chi square - tests it was found that there is a statistically significant score improvement for participants that were trained via the awareness methods. Furthermore, a risk analysis is conducted to identify, quantify and prioritize potential risks that could negatively affect the end-user's operations. The main idea concerning this proposed technique is the fact that the assessment methods can assist the employees to develop skills and abilities in order to use the digital world safely, avoiding phishing attacks. The risk analysis findings indicate that the awareness approach has significant improvement in long term lasting risk reduction. The study was conducted as part of the European Horizon 2020 DOGANA project which aims to deploy effective mitigation strategies and lead to reduce the risk created by modern Social Engineering 2.0 attack techniques. The results obtained in this paper corroborate the results obtained by the EU funded project SAINT from the econometric analysis and modeling of the cybercrime and cyber security markets.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Influence of Awareness and Training on Cyber Security
    McCrohan, Kevin
    Engel, Kathryn
    Harvey, James
    JOURNAL OF INTERNET COMMERCE, 2010, 9 (01) : 23 - 41
  • [2] Neurodiversity and Cyber Security Awareness Training
    Cooper, Martin
    ITNOW, 2024, 66 (03) : 54 - 55
  • [3] A video game for cyber security training and awareness
    Cone, Benjamin D.
    Irvine, Cynthia E.
    Thompson, Michael F.
    Nguyen, Thuy D.
    COMPUTERS & SECURITY, 2007, 26 (01) : 63 - 72
  • [4] Cyber security training and awareness through game play
    Cone, Benjamin D.
    Thompson, Michael F.
    Irvine, Cynthia E.
    Nguyen, Thuy D.
    SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 431 - +
  • [5] Performance Analysis of Cyber Security Awareness Delivery Methods
    Abawajy, Jemal
    Kim, Tai-hoon
    SECURITY TECHNOLOGY, DISASTER RECOVERY AND BUSINESS CONTINUITY, 2010, 122 : 142 - +
  • [7] Determination of Cyber Security Issues and Awareness Training for University Students
    Khamzina, Botagoz
    Roza, Nabuova
    Zhussupbekova, Gulsara
    Shaizhanova, Karlygash
    Aten, Aiganym
    Meirkhanovna, Baikulova Aigerim
    INTERNATIONAL JOURNAL OF EMERGING TECHNOLOGIES IN LEARNING, 2022, 17 (18) : 177 - 190
  • [8] Moving beyond cyber security awareness and training to engendering security knowledge sharing
    Alahmari, Saad
    Renaud, Karen
    Omoronyia, Inah
    INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2023, 21 (01) : 123 - 158
  • [9] Moving beyond cyber security awareness and training to engendering security knowledge sharing
    Saad Alahmari
    Karen Renaud
    Inah Omoronyia
    Information Systems and e-Business Management, 2023, 21 : 123 - 158
  • [10] Improving Cyber Security Awareness and Training Programs with Data Analytics
    Korpela, Karina
    INFORMATION SECURITY JOURNAL, 2015, 24 (1-3): : 72 - 77