skip to main content
article

Don't be a phish: steps in user education

Published:26 June 2006Publication History
Skip Abstract Section

Abstract

Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced in the last year an increase in frequency and diversity. While regular phishing attacks are easily thwarted, designing the attack to include user context information could potentially increase the user's vulnerability. To prevent this, phishing education needs to be considered. In this paper we provide an overview of phishing education, focusing on context aware attacks and introduce a new strategy for educating users by combining phishing IQ tests and class discussions. The technique encompasses displaying both legitimate and fraudulent e-mails to users and having them identify the phishing attempts from the authentic e-mails. Proper implementation of this system helps teach users what to look for in e-mails, and how to protect their confidential information from being caught in the nets of phishers. The strategy was applied in Introduction to Computing courses as part of the computer security component. Class assessment indicates an increased level of awareness and better recognition of attacks.

References

  1. CNN. com, "A convicted hacker debunks some myths." http://www.cnn.com/2005/TECH/internet/10/07/kevin.mitnick.cnna/index.html 2005, accessed 01/06/06Google ScholarGoogle Scholar
  2. Duntemann J., Degunking Your Email, Spam, And Viruses. Scottsdale, Arizona: Paraglyph Press, 2004Google ScholarGoogle Scholar
  3. Merwe A, Loock M., and Dabrowski M. "Characteristics and responsibilities involved in a Phishing attack." Proc. ACM WISCT 05, 92, 249--254, 2005 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. http://en.wikipedia.org/wiki/Phishing, accessed 30 Nov 2005Google ScholarGoogle Scholar
  5. Roberts, Paul F. "Cyber-looters Capitalize on Katrina." eWeek. 12 Sept. 2005: 11--12Google ScholarGoogle Scholar
  6. MailFrontier Phishing IQ, "Paypal Tsunami" example, http://www.mailfrontier.com/quiztest2/S2img/Q22_tsunami.gif, accessed 3 Nov. 2005.Google ScholarGoogle Scholar
  7. Kerstein P.L., "How Can We Stop Phishing and Pharming Scams?" http://www.csoonline.com/talkback/071905.html, accessed 27 Nov 2005Google ScholarGoogle Scholar
  8. Richardson T., "Brits Fall Prey to Phishing." The Register. http://www.theregister.co.uk/2005/05/03/aol_phishing/, accessed 27 Nov 2005Google ScholarGoogle Scholar
  9. Sunday Morning Herald, "Phishing Spreads in Europe", http://www.smh.com.au/articles/2004/05/10/1084041315645.html, accessed 5 Jan 2006Google ScholarGoogle Scholar
  10. Anti-Phishing Working Group, October 2005 Report, http://antiphishing.org/apwg_phishing_activity_report_oct_05.pdf, accessed 27 Nov 2005Google ScholarGoogle Scholar
  11. Jakobsson M., Modeling and Preventing Phishing Attacks. Phishing Panel in Financial Cryptography '05. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Anti-Phishing Working Group, http://www.antiphishing.org/, accessed 27 Nov 2005Google ScholarGoogle Scholar
  13. Better Business Bureau, http://www.bbbonline.org/idtheft/phishing_cond.asp, accessed 4 Jan 2006Google ScholarGoogle Scholar
  14. Microsoft, Consumer Awareness Page on Phishing http://www.microsoft.com/athome/security/email/phishing.mspx, accessed 6 Jan 2006Google ScholarGoogle Scholar
  15. Emigh A., Online Identity Theft: Phishing Technology, Chokepoints, and Countermeasures. Radix Labs. 3 Oct, 2005.Google ScholarGoogle Scholar
  16. Jagatic T., Johnson N., Jakobsson M., and Menczer F., "Social Phishing", Communications of ACM, to appear, http://www.indiana.edu/~phishing/social-network-experiment/phishing-preprint.pdf, accessed 3 Jan 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Mail Frontier. Phishing IQ, http://www.mailfrontier.com, accessed 3 Nov 2005Google ScholarGoogle Scholar
  18. Horgan D.,."The Phishing Phleet" Courant.com. http://blogs.courant.com/travel_columnists_horgan/2005/11/the_phishing_ph.html, accessed 2 Dec 2005Google ScholarGoogle Scholar
  19. Brandt A., "Phishing Anxiety May Make You Miss Messages" PCWORLD. October 2005: 34Google ScholarGoogle Scholar
  20. IU Phishing Research, http://www.indiana.edu/~phishing/, accessed 6 Jan 2006Google ScholarGoogle Scholar
  21. CNETNews.com, "Browser Phishing Flaw Could Hook Users", http://news.zdnet.com/2100-1009_22-5484315.html, accessed 15 Dec 2005Google ScholarGoogle Scholar
  22. Werner, Laurie. "Redefining Computer Literacy in the Age of Ubiquitous Computing." Proc. ACM SIGITE 05, 95--99, 2005 Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Anti-Phishing Working Group, "Phishing Activity Trends Report", http://www.antiphishing.org/reports/ apwg_report_DEC2005_FINAL.pdf, accessed 20 March 2006Google ScholarGoogle Scholar
  24. Korea Internet Security Center, "Korea Phishing Activity Trends Report", http://www.antiphishing.org/reports/ 200601_KoreaPhishingReport_Jan2006.pdf, accessed 20 March 2006Google ScholarGoogle Scholar

Index Terms

  1. Don't be a phish: steps in user education

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM SIGCSE Bulletin
            ACM SIGCSE Bulletin  Volume 38, Issue 3
            September 2006
            367 pages
            ISSN:0097-8418
            DOI:10.1145/1140123
            Issue’s Table of Contents
            • cover image ACM Conferences
              ITICSE '06: Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education
              June 2006
              390 pages
              ISBN:1595930558
              DOI:10.1145/1140124

            Copyright © 2006 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 26 June 2006

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader