Improving Phishing Awareness in the United States Department of Defense

被引:0
作者
Dukarm, Christopher [1 ]
Dill, Richard [1 ]
Reith, Mark [1 ]
机构
[1] US Air Force Inst Technol, Wright Patterson AFB, OH 45433 USA
来源
PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019) | 2019年
关键词
phishing; social engineering; cyber security; cyber defence;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Phishing emails are rapidly increasing in sophistication, evolving from poorly crafted attempts to entice a recipient to click, into legitimate looking emails and attachments. In response, email providers have to improve their detection technology by adding new rules to their firewalls and filters to block incoming spam and phishing emails. To overcome technical measures, attackers modify the content of their phishing emails and the source email address. In this cat and mouse game, network defenders rely on the user to report new threats, and the users depend on phishing awareness training to help them identify malicious emails. Fora large organization like the United States DoD (DoD) which boasts a workforce of 3.2 million employees, it is difficult to properly train employees to identify and report malicious emails. Like other organizations the DoD requires its employees to complete phishing awareness training, however the effectiveness of this training is widely disputed. Phishing prevention can be broken into three main components: automated filters and firewalls, automated warning messages, and behavioral training. This paper analyzes existing United States DoD phishing awareness behavioral training and proposes 3 principles of an improved behavioral training model. This paper will detail how focused training objectives, a DoD content-sharing platform and a realistic delivery method can be combined to offer an effective and sustainable phishing awareness campaign.
引用
收藏
页码:172 / 177
页数:6
相关论文
共 12 条
  • [1] Alexander R., 2012, BBC NEWS, V20
  • [2] Going Spear Phishing: Exploring Embedded Training and Awareness
    Caputo, Deanna D.
    Pfleeger, Shari Lawrence
    Freeman, Jesse D.
    Johnson, M. Eric
    [J]. IEEE SECURITY & PRIVACY, 2014, 12 (01) : 28 - 38
  • [3] Carella A, 2017, IEEE INT CONF BIG DA, P4458, DOI 10.1109/BigData.2017.8258485
  • [4] Defense Information Systems Agency, 2020, CYB AW CHALL
  • [5] Duran N., 2018, 2018 WEB ROOT THREAT
  • [6] No Phishing beyond This Point
    Greene, Kristen
    Steves, Michelle
    Theofanos, Mary
    [J]. COMPUTER, 2018, 51 (06) : 86 - 89
  • [7] Phishing for phishing awareness
    Jansson, K.
    von Solms, R.
    [J]. BEHAVIOUR & INFORMATION TECHNOLOGY, 2013, 32 (06) : 584 - 593
  • [8] Training to Mitigate Phishing Attacks Using Mindfulness Techniques
    Jensen, Matthew L.
    Dinger, Michael
    Wright, Ryan T.
    Thatcher, Jason Bennett
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2017, 34 (02) : 597 - 626
  • [9] KUMAR R, 2014, ECRIME RES SUMMIT, P36, DOI DOI 10.1109/ECRIME.2014.6963163
  • [10] Lakhita, 2015, 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), P1312, DOI 10.1109/ICGCIoT.2015.7380669