Prevention and mitigation measures against phishing emails: a sequential schema model

被引:4
|
作者
Suzuki, Yumi E. [1 ]
Monroy, Sergio A. Salinas [2 ]
机构
[1] Wichita State Univ, Sch Criminal Justice, 1845 Fairmt St, Wichita, KS 67260 USA
[2] Wichita State Univ, Sch Comp, Wichita, KS USA
关键词
Phishing email; Mitigation; Cybersecurity; Personally identifiable information; COMPUTER CRIME; TRENDS;
D O I
10.1057/s41284-021-00318-x
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Phishing emails have permeated our digital communication, taking advantage of vulnerabilities that the information technology system poses to users. Given the potential for further cybersecurity incidents, theft of personally identifiable information, and damage to organizations' assets, cybersecurity professionals have implemented various mitigation practices to combat phishing emails. This paper categorizes current mitigation practices in relation to a sequential schema adopted from the situational crime prevention approach, so as to enable a more organized and strategic assessment of human and environmental vulnerabilities. Our model could be useful for cybersecurity professionals to further advance mitigation measures as an incident progresses and for criminologists and other academic researchers to reduce the severity of subsequent criminal incidents.
引用
收藏
页码:1162 / 1182
页数:21
相关论文
共 50 条
  • [1] Prevention and mitigation measures against phishing emails: a sequential schema model
    Yumi E. Suzuki
    Sergio A. Salinas Monroy
    [J]. Security Journal, 2022, 35 : 1162 - 1182
  • [2] Education and Training Against Threat of Phishing Emails
    Burita, Ladislav
    Klaban, Ivo
    Racil, Tomas
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 7 - 18
  • [3] Individual processing of phishing emails How attention and elaboration protect against phishing
    Harrison, Brynne
    Svetieva, Elena
    Vishwanath, Arun
    [J]. ONLINE INFORMATION REVIEW, 2016, 40 (02) : 265 - 281
  • [4] Phishing Sites and Prevention Measures
    Zhou Fu-An
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 1 - 10
  • [5] Persuasion: How phishing emails can influence users and bypass security measures
    Ferreira, Ana
    Teles, Soraia
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 125 : 19 - 31
  • [6] MPMPA: A Mitigation and Prevention Model for Social Engineering Based Phishing attacks on Facebook
    Jamil, Abid
    Asif, Kashif
    Ghulam, Zikra
    Nazir, Muhammad Kashif
    Alam, Syed Mudassar
    Ashraf, Rehan
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 5040 - 5048
  • [7] Detection Technique and Mitigation Against a Phishing Attack
    Fetooh, Haytham Tarek Mohammed
    El-Gayar, M. M.
    Aboelfetouh, A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (09) : 177 - 188
  • [8] Mitigation strategies against the phishing attacks: A systematic literature review
    Naqvi, Bilal
    Perova, Kseniia
    Farooq, Ali
    Makhdoom, Imran
    Oyedeji, Shola
    Porras, Jari
    [J]. COMPUTERS & SECURITY, 2023, 132
  • [9] Mitigation of ineffective measures against radon
    Jiranek, M.
    Neznal, M.
    Neznal, M.
    [J]. RADIATION PROTECTION DOSIMETRY, 2008, 130 (01) : 68 - 71
  • [10] An improved transformer-based model for detecting phishing, spam and ham emails: A large language model approach
    Jamal, Suhaima
    Wimmer, Hayden
    Sarker, Iqbal H.
    [J]. SECURITY AND PRIVACY, 2024, 7 (05)