2019
DOI: 10.3390/fi11030073
|View full text |Cite
|
Sign up to set email alerts
|

Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues

Abstract: The idea and perception of good cyber security protection remains at the forefront of many organizations' information and communication technology strategy and investment. However, delving deeper into the details of its implementation reveals that organizations' human capital cyber security knowledge bases are very low. In particular, the lack of social engineering awareness is a concern in the context of human cyber security risks. This study highlights pitfalls and ongoing issues that organizations encounter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
37
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 109 publications
(77 citation statements)
references
References 53 publications
2
37
0
1
Order By: Relevance
“…Moreover, these traditional programs generally adopted a generalized approach rather than emphasizing different manipulation techniques adopted by attackers. Further, they were conducted in a completely formal setting which had certain limitations such as lack of employee engagement [10]. As mentioned in [11], traditional awareness programs like printing posters and warning messages in the form of screensavers only provided basic awareness regarding such attacks.…”
Section: Discussion 31 Traditional Awareness Programsmentioning
confidence: 99%
“…Moreover, these traditional programs generally adopted a generalized approach rather than emphasizing different manipulation techniques adopted by attackers. Further, they were conducted in a completely formal setting which had certain limitations such as lack of employee engagement [10]. As mentioned in [11], traditional awareness programs like printing posters and warning messages in the form of screensavers only provided basic awareness regarding such attacks.…”
Section: Discussion 31 Traditional Awareness Programsmentioning
confidence: 99%
“…Tablets are also equipped with various application software that poses the same limitation as mobile applications. They expose the user to possible malware, worm, and Trojan attack vectors of social engineering [40,[58][59][60][61][62]].…”
Section: Tabletmentioning
confidence: 99%
“…It has been widely accepted that awareness is one of the most important aspects of information security [5,6]. People using the most secure systems are also often the most vulnerable to social engineering attacks [7]. Employees sometimes ignore time-consuming security procedures in an effort to complete work tasks more quickly.…”
Section: Introductionmentioning
confidence: 99%
“…Given the fact that social engineering threats are dynamic and constantly evolving, developing a mitigation strategy becomes a top priority for organizations, including training employees to counter such attacks [7,10]. This countermeasure includes testing their level of awareness of social engineering from time to time [11,12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation