Unintentional Insider Threats: Social Engineering

download Unintentional Insider Threats: Social Engineering

of 109

Transcript of Unintentional Insider Threats: Social Engineering

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    1/109

    http://www.sei.cmu.edu/
  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    2/109

    mailto:[email protected]
  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    3/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    4/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    5/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    6/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    7/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    8/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    9/109

    mailto:[email protected]
  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    10/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    11/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    12/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    13/109

    http://www.sei.cmu.edu/library/abstracts/reports/13tn022.cfmhttp://www.algosec.com/resources/files/Specials/Survey%20files/
  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    14/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    15/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    16/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    17/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    18/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    19/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    20/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    21/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    22/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    23/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    24/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    25/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    26/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    27/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    28/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    29/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    30/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    31/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    32/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    33/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    34/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    35/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    36/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    37/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    38/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    39/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    40/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    41/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    42/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    43/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    44/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    45/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    46/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    47/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    48/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    49/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    50/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    51/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    52/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    53/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    54/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    55/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    56/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    57/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    58/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    59/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    60/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    61/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    62/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    63/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    64/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    65/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    66/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    67/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    68/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    69/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    70/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    71/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    72/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    73/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    74/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    75/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    76/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    77/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    78/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    79/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    80/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    81/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    82/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    83/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    84/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    85/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    86/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    87/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    88/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    89/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    90/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    91/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    92/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    93/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    94/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    95/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    96/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    97/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    98/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    99/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    100/109

    http://resources.sei.cmu.edu/library/asset-view.cfm?assetID=58744http://www.rbijou.com/2013/03/15/examining-the-cyber-kill-chain/http://www.antiphishing.org/reports/apwg_report_DEC2005_FINAL.pdfhttp://dro.deakin.edu.au/view/DU:30049075
  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    101/109

    http://dl.acm.org/citation.cfm?id=1124861http://computer-forensics.sans.org/blog/2009/10/14/security-intelligence-attacking-CMU/SEI-2013-TN-024http://computer-forensics.sans.org/blog/2009/10/14/security-intelligence-attacking-CMU/SEI-2013-TN-024http://computer-forensics.sans.org/blog/2009/10/14/security-intelligence-attacking-CMU/SEI-2013-TN-024
  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    102/109

    http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.64.1926&rep=rep1&type=pdfhttp://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/http://healthypeople.gov/2020/LHI/substanceAbuse.aspxhttp://arxiv.org/abs/1301.7643http://www.securityfocus.com/infocus/1527
  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    103/109

    http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5615076&url=http%3A%2F%2Fieeexplorhttp://www.who.int/occupational_health/publications/pwh3rev.pdfhttp://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1652125&url=http%3A%2F%2Fieeexplorhttp://www.sciencedirect.com/science/article/pii/S1742684704000898http://www.jstor.org/discover/10.2307/1914185?uid=3739960&uid=2&uid=4&uid=3739256&sidhttp://markus-jakobsson.com/papers/jakobsson-psci07.pdf
  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    104/109

    http://www.nytimes.com/2005/12/04/business/yourmoney/http://resources.infosecinstitute.com/http://www.us-cert.gov/security-publications/technical-trends-phishing-attacks
  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    105/109

    http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5279574http://www.time.com/time/health/article/0,8599,1869106,00.html
  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    106/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    107/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    108/109

  • 8/13/2019 Unintentional Insider Threats: Social Engineering

    109/109