A framework to mitigate phishing threats

We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment i...

Full description

Bibliographic Details
Main Author: Frauenstein, Edwin Donald
Format: Others
Language:English
Published: Nelson Mandela Metropolitan University 2013
Subjects:
Online Access:http://hdl.handle.net/10948/d1021208
id ndltd-netd.ac.za-oai-union.ndltd.org-nmmu-vital-9832
record_format oai_dc
spelling ndltd-netd.ac.za-oai-union.ndltd.org-nmmu-vital-98322017-12-21T04:22:43ZA framework to mitigate phishing threatsFrauenstein, Edwin DonaldComputer networks -- Security measuresMobile computing -- Security measuresOnline social networks -- Security measuresWe live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.Nelson Mandela Metropolitan UniversityFaculty of Engineering, the Built Environment and Information Technology2013ThesisMastersMTechxiii, 247 leavespdfvital:9832http://hdl.handle.net/10948/d1021208EnglishNelson Mandela Metropolitan University
collection NDLTD
language English
format Others
sources NDLTD
topic Computer networks -- Security measures
Mobile computing -- Security measures
Online social networks -- Security measures
spellingShingle Computer networks -- Security measures
Mobile computing -- Security measures
Online social networks -- Security measures
Frauenstein, Edwin Donald
A framework to mitigate phishing threats
description We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.
author Frauenstein, Edwin Donald
author_facet Frauenstein, Edwin Donald
author_sort Frauenstein, Edwin Donald
title A framework to mitigate phishing threats
title_short A framework to mitigate phishing threats
title_full A framework to mitigate phishing threats
title_fullStr A framework to mitigate phishing threats
title_full_unstemmed A framework to mitigate phishing threats
title_sort framework to mitigate phishing threats
publisher Nelson Mandela Metropolitan University
publishDate 2013
url http://hdl.handle.net/10948/d1021208
work_keys_str_mv AT frauensteinedwindonald aframeworktomitigatephishingthreats
AT frauensteinedwindonald frameworktomitigatephishingthreats
_version_ 1718565574260293632