TU Darmstadt / ULB / TUbiblio

Teaching Phishing-Security: Which Way is Best?

Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie ; Mayer, Peter ; Kunz, Alexandra ; Rack, Philipp ; Lehmann, Daniel (2016)
Teaching Phishing-Security: Which Way is Best?
Ghent, Belgium
Conference or Workshop Item, Bibliographie

Abstract

Ever more processes of our daily lives are shifting into the digital realm. Consequently, users face a variety of IT-security threats with possibly severe ramifications. It has been shown that technical measures alone are insufficient to counter all threats. For instance, it takes technical measures on average 32 hours before identifying and blocking phishing websites. Therefore, teaching users how to identify malicious websites is of utmost importance, if they are to be protected at all times. A number of ways to deliver the necessary knowledge to users exist. Among the most broadly used are instructor-based, computer-based and text-based training. We compare all three formats in the security context, or to be more precise in the context of anti-phishing training.

Item Type: Conference or Workshop Item
Erschienen: 2016
Creators: Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie ; Mayer, Peter ; Kunz, Alexandra ; Rack, Philipp ; Lehmann, Daniel
Type of entry: Bibliographie
Title: Teaching Phishing-Security: Which Way is Best?
Language: German
Date: June 2016
Publisher: Springer
Book Title: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
Event Location: Ghent, Belgium
Corresponding Links:
Abstract:

Ever more processes of our daily lives are shifting into the digital realm. Consequently, users face a variety of IT-security threats with possibly severe ramifications. It has been shown that technical measures alone are insufficient to counter all threats. For instance, it takes technical measures on average 32 hours before identifying and blocking phishing websites. Therefore, teaching users how to identify malicious websites is of utmost importance, if they are to be protected at all times. A number of ways to deliver the necessary knowledge to users exist. Among the most broadly used are instructor-based, computer-based and text-based training. We compare all three formats in the security context, or to be more precise in the context of anti-phishing training.

Uncontrolled Keywords: Security, Usability and Society;Secure Data
Identification Number: TUD-CS-2016-0057
Divisions: LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
20 Department of Computer Science > SECUSO - Security, Usability and Society
20 Department of Computer Science > Theoretical Computer Science - Cryptography and Computer Algebra
Profile Areas > Cybersecurity (CYSEC)
LOEWE > LOEWE-Zentren
20 Department of Computer Science
Profile Areas
LOEWE
Date Deposited: 28 Jul 2016 18:35
Last Modified: 30 May 2018 12:53
PPN:
Corresponding Links:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details