Prevention and mitigation measures against phishing emails: a sequential schema model

被引:8
作者
Suzuki, Yumi E. [1 ]
Monroy, Sergio A. Salinas [2 ]
机构
[1] Wichita State Univ, Sch Criminal Justice, 1845 Fairmt St, Wichita, KS 67260 USA
[2] Wichita State Univ, Sch Comp, Wichita, KS USA
关键词
Phishing email; Mitigation; Cybersecurity; Personally identifiable information; COMPUTER CRIME; TRENDS;
D O I
10.1057/s41284-021-00318-x
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Phishing emails have permeated our digital communication, taking advantage of vulnerabilities that the information technology system poses to users. Given the potential for further cybersecurity incidents, theft of personally identifiable information, and damage to organizations' assets, cybersecurity professionals have implemented various mitigation practices to combat phishing emails. This paper categorizes current mitigation practices in relation to a sequential schema adopted from the situational crime prevention approach, so as to enable a more organized and strategic assessment of human and environmental vulnerabilities. Our model could be useful for cybersecurity professionals to further advance mitigation measures as an incident progresses and for criminologists and other academic researchers to reduce the severity of subsequent criminal incidents.
引用
收藏
页码:1162 / 1182
页数:21
相关论文
共 86 条
  • [1] HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle
    Akiyama, Mitsuaki
    Yagi, Takeshi
    Hariu, Takeo
    Kadobayashi, Youki
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (02) : 135 - 151
  • [2] [Anonymous], 2014, Framework for improving critical infrastructure cybersecurity
  • [3] [Anonymous], 1998, Fighting computer crime: A new framework for protecting information
  • [4] [Anonymous], 2010, Defense in depth
  • [5] Anti-Phishing Working Group, 2020, PHISH ACT TRENDS REP
  • [6] Back S., 2020, International Journal of Cybersecurity Intelligence and Cybercrime, V3, P25, DOI [10.52306/RGWS2555, DOI 10.52306/RGWS2555]
  • [7] New filtering approaches for phishing email
    Bergholz, Andre
    De Beer, Jan
    Glahn, Sebastian
    Moens, Marie-Francine
    Paass, Gerhard
    Strobel, Siehyun
    [J]. JOURNAL OF COMPUTER SECURITY, 2010, 18 (01) : 7 - 35
  • [8] Better Business Bureau, 2019, IS EM REALL BOSS EXP
  • [9] Bossler A, 2020, ROUT STUD CRIM SOC, P29
  • [10] Button M., 2017, Cyber Frauds, Scams and their Victims, V1st, DOI DOI 10.4324/9781315679877