Is Your Susceptibility to Phishing Dependent on Your Memory?

نویسندگان

  • Bonnie Anderson
  • Anthony Vance
  • David Eargle
  • Anderson Bonnie Brinton
چکیده

Phishing has become a major attack vector for hackers and cost victims $687 million in the first half of 2012 alone. Additionally, despite technical solutions to defend against this threat, reports show that phishing attacks are increasing. There is therefore a pressing need to understand why users continue to fall victim to phishing, and how such attacks can be prevented. In this researchin-progress paper, we argue that the cognitive neuroscience of memory provides a useful lens through which to study the problem of phishing. A commonly reported finding from the field of memory is the eye movement-based memory effect, the phenomenon of people paying less visual attention to images that have been previously viewed. We aim to show in this paper that this effect holds in the context of email processing, and that the eye movement-based memory effect is a significant contributing factor to users’ susceptibility to phishing. We propose an experimental design that uses a memory task involving simulated phishing emails, and measures users’ behavioral responses and eye tracking data in response to our phishing manipulations. We further propose to show how training can be designed to help users overcome the eye movementbased memory effect and become less prone to phishing attacks. 1 Corresponding author: [email protected] Anderson et al. Is Your Susceptibility to Phishing Dependent ... Proceedings of the Eighth Pre-ICIS Workshop on Information Security and Privacy, Milano, December 14, 2013. 2

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dwarf Frankenstein is still in your memory: tiny code reuse attacks

Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...

متن کامل

قانون طلایی تدارک حمایت از دانش آموزان با نیازهای ویژه در کلاسهای فراگیر: از دیگران آنطور حمایت کنید که دوست دارید از شما حمایت کنند

Consider for a moment that the school system paid someone to be with you supporting you 8 hours a day, 5 days a week. Now, imagine that you had no say over who that support person was or how she or he supported you. Or imagine that someone regularly stopped into your place of employment to provide you with one-on-one support. This person was present for all your interactions, escorted you to th...

متن کامل

P14: How to Find a Talent?

Talents may be artistic or technical, mental or physical, personal or social. You can be a talented introvert or a talented extrovert. Learning to look for your talents in the right places and building those talents into skills and abilities might take some work, but going about it creatively will let you explore your natural abilities and find your innate talents. You’re not going to fin...

متن کامل

Using Actions and Intentions to Evaluate Categorical Responses to Phishing and Genuine Emails

While many studies have investigated people’s susceptibility to phishing emails, little attention has been paid to how behavioural responses translate into overall intent when users are not informed they are undertaking a phishing study. This paper examines how well the quantitative multiple-choice categorisation used in such studies reflects the underlying reasoning of the users. The results o...

متن کامل

مدیر موفق کیست؟

Who is a really successful manager? A manager who spends less money, or the one who earns more? A manager who can survive for a longer period of time, or an administrator who expands his organization, and opens up new branches? Which one is the most successful? The article tries to answer these questions and provides, some simple guidlines for the managers in every domain of management who wan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017