Security Strategies for Hindering Watering Hole Cyber Crime Attack
Тип публикации: Journal Article
Дата публикации: 2017-12-26
General Engineering
Краткое описание
The significant increase of Advanced Persistent Threat (APT) attacks, especially via watering hole leads to a huge loss to the company as they enable Bring Your Own Devices (BYOD) in the workplace. Higher education institutions also faced the same threat since BYOD has been adopted into their institution. In this paper, a simulation on watering hole attack and spear phishing; comparison between these two APT variants, as well as the survey design based on the Protection Motivation Theory (PMT) are presented. The result of the survey is analyzed using PLS-SEM. The result demonstrated that severity factor and vulnerability factor moderately explained the Protection Behaviour factor; and Protection Behaviour factor is a moderately strong predictor to self-efficacy, but avoidance behavior does not predict self-efficacy directly. Based on this result, a set of security policy for hindering watering hole and spear phishing attack is designed and implemented. The new policy will then be adapted to the university e-learning portal.
Найдено
Ничего не найдено, попробуйте изменить настройки фильтра.
Найдено
Ничего не найдено, попробуйте изменить настройки фильтра.
Топ-30
Журналы
|
1
|
|
|
Applied Sciences (Switzerland)
1 публикация, 5.56%
|
|
|
Electronics (Switzerland)
1 публикация, 5.56%
|
|
|
IOP Conference Series: Earth and Environmental Science
1 публикация, 5.56%
|
|
|
Journal of Information Security and Applications
1 публикация, 5.56%
|
|
|
Computers and Security
1 публикация, 5.56%
|
|
|
Lecture Notes in Electrical Engineering
1 публикация, 5.56%
|
|
|
Artificial Intelligence in Data and Big Data Processing
1 публикация, 5.56%
|
|
|
IEEE Transactions on Intelligent Transportation Systems
1 публикация, 5.56%
|
|
|
Law Reform: Jurnal Pembaharuan Hukum
1 публикация, 5.56%
|
|
|
Frontiers in Artificial Intelligence
1 публикация, 5.56%
|
|
|
Information Processing and Management
1 публикация, 5.56%
|
|
|
PeerJ Computer Science
1 публикация, 5.56%
|
|
|
IEEE Transactions on Dependable and Secure Computing
1 публикация, 5.56%
|
|
|
Frontiers in Computer Science
1 публикация, 5.56%
|
|
|
AIP Conference Proceedings
1 публикация, 5.56%
|
|
|
1
|
Издатели
|
1
2
3
|
|
|
Elsevier
3 публикации, 16.67%
|
|
|
MDPI
2 публикации, 11.11%
|
|
|
Springer Nature
2 публикации, 11.11%
|
|
|
Institute of Electrical and Electronics Engineers (IEEE)
2 публикации, 11.11%
|
|
|
Frontiers Media S.A.
2 публикации, 11.11%
|
|
|
IOP Publishing
1 публикация, 5.56%
|
|
|
IGI Global
1 публикация, 5.56%
|
|
|
Association for Computing Machinery (ACM)
1 публикация, 5.56%
|
|
|
PeerJ
1 публикация, 5.56%
|
|
|
AIP Publishing
1 публикация, 5.56%
|
|
|
1
2
3
|
- Мы не учитываем публикации, у которых нет DOI.
- Статистика публикаций обновляется еженедельно.
Вы ученый?
Создайте профиль, чтобы получать персональные рекомендации коллег, конференций и новых статей.
Метрики
18
Всего цитирований:
18
Цитирований c 2024:
7
(38.89%)
Цитировать
ГОСТ |
RIS |
BibTex
Цитировать
ГОСТ
Скопировать
Ismail K. A. et al. Security Strategies for Hindering Watering Hole Cyber Crime Attack // Procedia Computer Science. 2017. Vol. 124. pp. 656-663.
ГОСТ со всеми авторами (до 50)
Скопировать
Ismail K. A., Singh M., Mustaffa N., Keikhosrokiani P., Zulkefli Z. Security Strategies for Hindering Watering Hole Cyber Crime Attack // Procedia Computer Science. 2017. Vol. 124. pp. 656-663.
Цитировать
RIS
Скопировать
TY - JOUR
DO - 10.1016/j.procs.2017.12.202
UR - https://doi.org/10.1016/j.procs.2017.12.202
TI - Security Strategies for Hindering Watering Hole Cyber Crime Attack
T2 - Procedia Computer Science
AU - Ismail, Khairun Ashikin
AU - Singh, Manmeet
AU - Mustaffa, Norlia
AU - Keikhosrokiani, Pantea
AU - Zulkefli, Zakiah
PY - 2017
DA - 2017/12/26
PB - Elsevier
SP - 656-663
VL - 124
SN - 1877-0509
ER -
Цитировать
BibTex (до 50 авторов)
Скопировать
@article{2017_Ismail,
author = {Khairun Ashikin Ismail and Manmeet Singh and Norlia Mustaffa and Pantea Keikhosrokiani and Zakiah Zulkefli},
title = {Security Strategies for Hindering Watering Hole Cyber Crime Attack},
journal = {Procedia Computer Science},
year = {2017},
volume = {124},
publisher = {Elsevier},
month = {dec},
url = {https://doi.org/10.1016/j.procs.2017.12.202},
pages = {656--663},
doi = {10.1016/j.procs.2017.12.202}
}