dc.contributor.author |
Mouton, Francois
|
|
dc.contributor.author |
Leenen, Louise
|
|
dc.contributor.author |
Venter, H.S. (Hein)
|
|
dc.date.accessioned |
2016-04-25T11:01:13Z |
|
dc.date.issued |
2016-06 |
|
dc.description.abstract |
The field of information security is a fast-growing discipline. Even though the effectiveness
of security measures to protect sensitive information is increasing, people remain
susceptible to manipulation and thus the human element remains a weak link. A social engineering
attack targets this weakness by using various manipulation techniques to elicit
sensitive information. The field of social engineering is still in its early stages with regard
to formal definitions, attack frameworks and templates of attacks. This paper proposes detailed
social engineering attack templates that are derived from real-world social engineering
examples. Current documented examples of social engineering attacks do not include all
the attack steps and phases. The proposed social engineering attack templates attempt to
alleviate the problem of limited documented literature on social engineering attacks by
mapping the real-world examples to the social engineering attack framework. Mapping several
similar real-world examples to the social engineering attack framework allows one to establish
a detailed flow of the attack whilst abstracting subjects and objects. This mapping
is then utilised to propose the generalised social engineering attack templates that are representative
of real-world examples, whilst still being general enough to encompass several
different real-world examples. The proposed social engineering attack templates cover all
three types of communication, namely bidirectional communication, unidirectional communication
and indirect communication. In order to perform comparative studies of different
social engineering models, processes and frameworks, it is necessary to have a formalised
set of social engineering attack scenarios that are fully detailed in every phase and step of
the process.The social engineering attack templates are converted to social engineering attack
scenarios by populating the template with both subjects and objects from real-world examples
whilst still maintaining the detailed flow of the attack as provided in the template.
Furthermore, this paper illustrates how the social engineering attack scenarios are applied
to verify a social engineering attack detection model. These templates and scenarios can
be used by other researchers to either expand on, use for comparative measures, create additional
examples or evaluate models for completeness. Additionally, the proposed social
engineering attack templates can also be used to develop social engineering awareness
material. |
en_ZA |
dc.description.department |
Computer Science |
en_ZA |
dc.description.embargo |
2017-06-30 |
|
dc.description.librarian |
hb2016 |
en_ZA |
dc.description.uri |
http://www.elsevier.com/locate/cose |
en_ZA |
dc.identifier.citation |
Mouton, F, Leenen, L & Venter, HS 2016, 'Social engineering attack examples, templates and scenarios', Computers and Security, vol. 59, pp. 186-209. |
en_ZA |
dc.identifier.issn |
0167-4048 (print) |
|
dc.identifier.issn |
1872-6208 (online) |
|
dc.identifier.other |
10.1016/j.cose.2016.03.004 |
|
dc.identifier.uri |
http://hdl.handle.net/2263/52151 |
|
dc.language.iso |
en |
en_ZA |
dc.publisher |
Elsevier |
en_ZA |
dc.rights |
© 2016 Elsevier Ltd. All rights reserved. Notice : this is the author’s version of a work that was accepted for publication in Computers and Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers and Security, vol. 59, pp. 186-209, 2016. doi : 10.1016/j.cose.2016.03.004. |
en_ZA |
dc.subject |
Bidirectional communication |
en_ZA |
dc.subject |
Indirect communication |
en_ZA |
dc.subject |
Mitnick’s attack cycle |
en_ZA |
dc.subject |
Social engineering |
en_ZA |
dc.subject |
Social engineering attack detection model |
en_ZA |
dc.subject |
Social engineering attack examples |
en_ZA |
dc.subject |
Social engineering attack framework |
en_ZA |
dc.subject |
Social engineering attack scenario |
en_ZA |
dc.subject |
Social engineering attack templates |
en_ZA |
dc.subject |
Unidirectional communication |
en_ZA |
dc.title |
Social engineering attack examples, templates and scenarios |
en_ZA |
dc.type |
Postprint Article |
en_ZA |