How Experts Detect Phishing Scam Emails

被引:19
作者
Wash R. [1 ]
机构
[1] Michigan State University, Media and Information, East Lansing, MI
基金
美国国家科学基金会;
关键词
email; phishing; security;
D O I
10.1145/3415231
中图分类号
学科分类号
摘要
Phishing scam emails are emails that pretend to be something they are not in order to get the recipient of the email to undertake some action they normally would not. While technical protections against phishing reduce the number of phishing emails received, they are not perfect and phishing remains one of the largest sources of security risk in technology and communication systems. To better understand the cognitive process that end users can use to identify phishing messages, I interviewed 21 IT experts about instances where they successfully identified emails as phishing in their own inboxes. IT experts naturally follow a three-stage process for identifying phishing emails. In the first stage, the email recipient tries to make sense of the email, and understand how it relates to other things in their life. As they do this, they notice discrepancies: little things that are "off'' about the email. As the recipient notices more discrepancies, they feel a need for an alternative explanation for the email. At some point, some feature of the email-usually, the presence of a link requesting an action-triggers them to recognize that phishing is a possible alternative explanation. At this point, they become suspicious (stage two) and investigate the email by looking for technical details that can conclusively identify the email as phishing. Once they find such information, then they move to stage three and deal with the email by deleting it or reporting it. I discuss ways this process can fail, and implications for improving training of end users about phishing. © 2020 Owner/Author.
引用
收藏
相关论文
共 54 条
  • [51] Wash R., Cooper M.M., Who provides phishing training?, Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems-CHI '18, pp. 1-12, (2018)
  • [52] Weick K.E., Sensemaking in Organizations, (1995)
  • [53] Wolff J., You'Ll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches, (2018)
  • [54] Zhuang W., Jiang Q., Xiong T., An intelligent anti-phishing strategy model for phishing website detection, 2012 32nd International Conference on Distributed Computing Systems Workshops, pp. 51-56, (2012)