References & Citations
Computer Science > Cryptography and Security
Title: Exploring Historical and Emerging Phishing Techniques and Mitigating the Associated Security Risks
(Submitted on 30 Nov 2015)
Abstract: Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure. These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most organizations rely on training to mitigate and reduce risk of non-technical attacks such as social engineering. Organizations lump IA training into small modules that personnel typically rush through because the training programs lack enough depth and creativity to keep a trainee engaged. The key to retaining knowledge is making the information memorable. This paper describes common and emerging attack vectors and how to lower and mitigate the associated risks.
Submission history
From: Syed (Shawon) Rahman [view email][v1] Mon, 30 Nov 2015 23:05:03 GMT (941kb)
Link back to: arXiv, form interface, contact.