Mouton, FrancoisTeixeira, MMeyer, T2018-01-042018-01-042017-11Mouton, F., Teixeira, M. and Meyer, T. 2017. Benchmarking a mobile implementation of the social engineering prevention training tool. Proceedings of the 16th Information Security South Africa 2017, Johannesburg, South Africa, 23 November 2017, pp. 106-116978-1-5386-0544-8http://pubs.cs.uct.ac.za/archive/00001202/http://pubs.cs.uct.ac.za/archive/00001202/01/paper_38.pdfhttp://hdl.handle.net/10204/9926Copyright: 2017 IEEE. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website. Alternatively, the paper may be obtained via the links provided.As the nature of information stored digitally be- comes more important and confidential, the security of the systems put in place to protect this information needs to be increased. The human element, however, remains a vulnerability of the system and it is this vulnerability that social engineers attempt to exploit. The Social Engineering Attack Detection Model version 2 (SEADMv2) has been proposed to help people identify malicious social engineering attacks. Prior to this study, the SEADMv2 had not been implemented as a user friendly application or tested with real subjects. This paper describes how the SEADMv2 was implemented as an Android application. This Android application was tested on 20 subjects, to determine whether it reduces the probability of a subject falling victim to a social engineering attack or not. The results indicated that the Android implementation of the SEADMv2 significantly reduced the number of subjects that fell victim to social engineering attacks. The Android application also significantly reduced the number of subjects that fell victim to malicious social engineering attacks, bidirectional communication social engineering attacks and indirect communication social engineering attacks. The Android application did not have a statistically significant effect on harmless scenarios and unidirectional communication social engineering attacks.enAndroidAwarenessCyber securityMobile developmentSocial engineeringSocial Engineering Attack Detection ModelSocial Engineering Attack FrameworkBenchmarking a mobile implementation of the social engineering prevention training toolConference PresentationMouton, F., Teixeira, M., & Meyer, T. (2017). Benchmarking a mobile implementation of the social engineering prevention training tool. IEEE. http://hdl.handle.net/10204/9926Mouton, Francois, M Teixeira, and T Meyer. "Benchmarking a mobile implementation of the social engineering prevention training tool." (2017): http://hdl.handle.net/10204/9926Mouton F, Teixeira M, Meyer T, Benchmarking a mobile implementation of the social engineering prevention training tool; IEEE; 2017. http://hdl.handle.net/10204/9926 .TY - Conference Presentation AU - Mouton, Francois AU - Teixeira, M AU - Meyer, T AB - As the nature of information stored digitally be- comes more important and confidential, the security of the systems put in place to protect this information needs to be increased. The human element, however, remains a vulnerability of the system and it is this vulnerability that social engineers attempt to exploit. The Social Engineering Attack Detection Model version 2 (SEADMv2) has been proposed to help people identify malicious social engineering attacks. Prior to this study, the SEADMv2 had not been implemented as a user friendly application or tested with real subjects. This paper describes how the SEADMv2 was implemented as an Android application. This Android application was tested on 20 subjects, to determine whether it reduces the probability of a subject falling victim to a social engineering attack or not. The results indicated that the Android implementation of the SEADMv2 significantly reduced the number of subjects that fell victim to social engineering attacks. The Android application also significantly reduced the number of subjects that fell victim to malicious social engineering attacks, bidirectional communication social engineering attacks and indirect communication social engineering attacks. The Android application did not have a statistically significant effect on harmless scenarios and unidirectional communication social engineering attacks. DA - 2017-11 DB - ResearchSpace DP - CSIR KW - Android KW - Awareness KW - Cyber security KW - Mobile development KW - Social engineering KW - Social Engineering Attack Detection Model KW - Social Engineering Attack Framework LK - https://researchspace.csir.co.za PY - 2017 SM - 978-1-5386-0544-8 T1 - Benchmarking a mobile implementation of the social engineering prevention training tool TI - Benchmarking a mobile implementation of the social engineering prevention training tool UR - http://hdl.handle.net/10204/9926 ER -