Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Resiliens mot social engineering: En studie om organisationers förmåga att hantera social engineering.
Halmstad University, School of Information Technology.
Halmstad University, School of Information Technology.
2019 (Swedish)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

Given the major technological development that has been made in the last decades, companies and organizations draw benefit from these technological means to communicate in new ways rather than using old school methods like snail-mail. This has led to many new attack vectors for culprits looking to commit fraud. These attack vectors have proven to be very effective given the fact that culprits can target massive volumes of potential targets. The purpose of this report was divided into two parts, investigate to what extent employees were aware of the phenomena “social engineering” as well as conducting a literature study to gather knowledge about common attacks and defence mechanisms to counter these attacks.

To investigate the awareness regarding “social engineering” of employees in different organizations, eight different qualitative interviews were conducted with employees of different organizations. To gather knowledge about common social engineering attacks an extensive literature study was done.

The interviews revealed that many employees had low awareness about social engineering and many of them also failed to manage their credentials to IT-systems in a safe way. The interviewed subjects also shared a low awareness regarding their organizations policies regarding IT-security.

The literature study revealed that social engineering attacks come in many different forms.Many of the attacks are very similar but regarding who they are targeting, or which mediumis used for the attack they can receive a different name. The social engineering attack called “phishing” was the most recurrent type of social engineering attack and hence a lot of this thesis is focused on this attack. Examples of authentic successful phishing attempts arepresented.

Place, publisher, year, edition, pages
2019. , p. 91
Keywords [sv]
Social, Engineering, Resiliens, mot
National Category
Information Systems
Identifiers
URN: urn:nbn:se:hh:diva-40236OAI: oai:DiVA.org:hh-40236DiVA, id: diva2:1337413
Subject / course
Digital Forensics
Educational program
IT Forensics and Information Security, 180 credits
Supervisors
Examiners
Available from: 2019-07-30 Created: 2019-07-14 Last updated: 2019-07-30Bibliographically approved

Open Access in DiVA

fulltext(1567 kB)11 downloads
File information
File name FULLTEXT02.pdfFile size 1567 kBChecksum SHA-512
bbd1f5ce997c8ed808e3ed6074ff010e4bfe5622ae18f5a32a70edb7737ee78d919783281c1b39e1008c1734eaeaf26cc9daded7b4196f5eed73bdff5bb72e18
Type fulltextMimetype application/pdf

By organisation
School of Information Technology
Information Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 11 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 38 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf