Exploring Historical and Emerging Phishing Techniques and Mitigating the Associated Security Risks

Marc Rader,Shawon Rahman
DOI: https://doi.org/10.5121/ijnsa.2013.5402
2015-12-01
Abstract:Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure. These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most organizations rely on training to mitigate and reduce risk of non-technical attacks such as social engineering. Organizations lump IA training into small modules that personnel typically rush through because the training programs lack enough depth and creativity to keep a trainee engaged. The key to retaining knowledge is making the information memorable. This paper describes common and emerging attack vectors and how to lower and mitigate the associated risks.
Cryptography and Security,Computers and Society
What problem does this paper attempt to address?