DocumentCode
154278
Title
Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits
Author
Greitzer, Frank L. ; Strozer, Jeremy R. ; Cohen, Sholom ; Moore, Andrew P. ; Mundie, David ; Cowley, Jennifer
Author_Institution
PsyberAnalytix, Richland, WA, USA
fYear
2014
fDate
17-18 May 2014
Firstpage
236
Lastpage
250
Abstract
Organizations often suffer harm from individuals who bear no malice against them but whose actions unintentionally expose the organizations to risk-the unintentional insider threat (UIT). In this paper we examine UIT cases that derive from social engineering exploits. We report on our efforts to collect and analyze data from UIT social engineering incidents to identify possible behavioral and technical patterns and to inform future research and development of UIT mitigation strategies.
Keywords
security of data; UIT mitigation strategies; UIT social engineering incidents; social engineering exploits; unintentional insider threats; Computers; Context; Educational institutions; Electronic mail; Organizations; Security; Taxonomy; social engineering; unintentional insider threat;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy Workshops (SPW), 2014 IEEE
Conference_Location
San Jose, CA
Type
conf
DOI
10.1109/SPW.2014.39
Filename
6957309
Link To Document