Prevention and mitigation measures against phishing emails: a sequential schema model

被引:0
作者
Yumi E. Suzuki
Sergio A. Salinas Monroy
机构
[1] Wichita State University,School of Criminal Justice
[2] Wichita State University,School of Computing
来源
Security Journal | 2022年 / 35卷
关键词
Phishing email; Mitigation; Cybersecurity; Personally identifiable information;
D O I
暂无
中图分类号
学科分类号
摘要
Phishing emails have permeated our digital communication, taking advantage of vulnerabilities that the information technology system poses to users. Given the potential for further cybersecurity incidents, theft of personally identifiable information, and damage to organizations’ assets, cybersecurity professionals have implemented various mitigation practices to combat phishing emails. This paper categorizes current mitigation practices in relation to a sequential schema adopted from the situational crime prevention approach, so as to enable a more organized and strategic assessment of human and environmental vulnerabilities. Our model could be useful for cybersecurity professionals to further advance mitigation measures as an incident progresses and for criminologists and other academic researchers to reduce the severity of subsequent criminal incidents.
引用
收藏
页码:1162 / 1182
页数:20
相关论文
共 61 条
  • [1] Akiyama M(2018)HoneyCirculator: Distributing credential honeytoken for introspection of web-based attack cycle International Journal of Information Security 17 135-151
  • [2] Yagi T(2020)Cyber-situational crime prevention and the breadth of cybercrimes among higher education institutions International Journal of Cybersecurity Intelligence and Cybercrime 3 25-47
  • [3] Hariu T(2010)New filtering approaches for phishing email Journal of Computer Security 18 7-35
  • [4] Kadobayashi Y(2017)State of research on phishing and recent trends of attacks i-Manager’s Journal on Computer Science 5 14-35
  • [5] Back S(1983)Situational crime prevention: Its theoretical basis and practical scope Crime and Justice 4 225-256
  • [6] LaPrade J(1979)Social change and crime rate trends: A routine activity approach American Sociological Review 44 588-608
  • [7] Bergholz A(1987)Understanding crime displacement: An application of rational choice theory Criminology 25 933-948
  • [8] De Beer J(2003)Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention Crime Prevention Studies 16 41-96
  • [9] Glahn S(2020)An in-depth benchmarking and evaluation of phishing detection research for security needs IEEE Access 8 22170-22192
  • [10] Moens MF(2020)Exploring identity-based crime victimizations: Assessing threats and victim services among a sample of professionals Deviant Behavior 36 12-15