A framework to mitigate phishing threats
We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment i...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Nelson Mandela Metropolitan University
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10948/d1021208 |
id |
ndltd-netd.ac.za-oai-union.ndltd.org-nmmu-vital-9832 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-netd.ac.za-oai-union.ndltd.org-nmmu-vital-98322017-12-21T04:22:43ZA framework to mitigate phishing threatsFrauenstein, Edwin DonaldComputer networks -- Security measuresMobile computing -- Security measuresOnline social networks -- Security measuresWe live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.Nelson Mandela Metropolitan UniversityFaculty of Engineering, the Built Environment and Information Technology2013ThesisMastersMTechxiii, 247 leavespdfvital:9832http://hdl.handle.net/10948/d1021208EnglishNelson Mandela Metropolitan University |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
Computer networks -- Security measures Mobile computing -- Security measures Online social networks -- Security measures |
spellingShingle |
Computer networks -- Security measures Mobile computing -- Security measures Online social networks -- Security measures Frauenstein, Edwin Donald A framework to mitigate phishing threats |
description |
We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme. |
author |
Frauenstein, Edwin Donald |
author_facet |
Frauenstein, Edwin Donald |
author_sort |
Frauenstein, Edwin Donald |
title |
A framework to mitigate phishing threats |
title_short |
A framework to mitigate phishing threats |
title_full |
A framework to mitigate phishing threats |
title_fullStr |
A framework to mitigate phishing threats |
title_full_unstemmed |
A framework to mitigate phishing threats |
title_sort |
framework to mitigate phishing threats |
publisher |
Nelson Mandela Metropolitan University |
publishDate |
2013 |
url |
http://hdl.handle.net/10948/d1021208 |
work_keys_str_mv |
AT frauensteinedwindonald aframeworktomitigatephishingthreats AT frauensteinedwindonald frameworktomitigatephishingthreats |
_version_ |
1718565574260293632 |