Approach on Increasing User Security Awareness

Open access

Abstract

Currently, social engineering attacks are increasingly sophisticated and the main factor that can influence the success of these techniques is the employee. Awareness of these types of attacks through permanent information sessions can be a good practice for any organization. In this work, besides the approach to the development of eLearning content accessible to employees, there are presented some methods and tools that can be used to avoid the theft of sensitive information or the infection of hosts on the network.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] Ian Mann Hacking the Human. Social Engineering techniques and Security Countermeasures Gower 2018 ISBN 978-0-566-08773-8.

  • [2] Samir E. Hamada Khaled Elleithy Ioana Badara Saeid Moslehpour Automated Adaptive Mobile Learning System using Shortest Path Algorithm and Learning Style in International Journal : Interactive Mobile Technologie iJIM – Vol. 12 No. 5 2018 pp. 4-27 ISSN: 1865-7923.

  • [3] https://www.cybrary.it/course/end-user-security-awareness-1-hour/

  • [4] https://www.eset.com/us/cybertraining/

  • [5] https://training.advisera.com/awareness-session/security-awareness-training/

  • [6] David Winograd Ways Microlearning increases attention and retention eLearning Industry https://elearningindustry.com/microlearning-increases-attention-retention-ways accesed on march 2019.

  • [7] Debadrita Sengupta 5 Ways you can use microlearning in corporate training eLearning Industry http://cblpro.com/blog/2019/02/25/5-ways-you-can-use-micro-learning-in-corporate-training/ accessed on 15 February 2019.

  • [8] Duffany J.L. Computer Security in Computer and Network Security Essentials Springer 2017 ISBN 978-3-319-58423-2 pp. 3-20.

  • [9] Raphaël Hertzog Jim O’Gorman and Mati Aharoni Kali Linux Revealed. Mastering the Penetration Testing Distribution Offsec Press 2017 ISBN 978-0-9976156-0-9.

  • [10] Department of Defence Cybersecurity Test and Evaluation Guidebook Version 2 April 2018.

  • [11] Beggs Robert W. Mastering Kali Linux for advanced penetration testing Packt Publishing Ltd 2014 ISBN 978-1782163121.

  • [12] Oriyano Sean-Philip Solomon Michael G. Hacker Techniques Tools and incident Handling 3rd Edition Information Systems Security and Assurance Series (ISSA) Jones & Bartlett Learning 2018 ISBN 978-1284147803.

Search
Journal information
Target audience: researchers in the fields of political and financial law
Metrics
All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 25 25 14
PDF Downloads 22 22 14