2 research outputs found

    Preventing SMishing Attack Using Fake User Information Based on Common Behavior of Phishing Websites

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2014. 2. ์กฐ์œ ๊ทผ.์Šค๋ฏธ์‹ฑ ๊ณต๊ฒฉ์€ ๋ชจ๋ฐ”์ผ ํ”ผ์‹ฑ ๊ณต๊ฒฉ์˜ ํ•œ ์œ ํ˜•์œผ๋กœ ์Šค๋งˆํŠธํฐ ์‚ฌ์šฉ์ž์˜ ๊ฐœ์ธ์ •๋ณด๋ฅผ ํƒˆ์ทจํ•˜๊ฑฐ๋‚˜ ์†Œ์•ก๊ฒฐ์ œ ๋“ฑ์œผ๋กœ ๊ธˆ์ „์  ํ”ผํ•ด๋ฅผ ์ž…ํžˆ๋Š” ๊ฒƒ์„ ๋ชฉ์ ์œผ๋กœ ํ•œ๋‹ค. URL์ด ํฌํ•จ๋œ ๋ฉ”์‹œ์ง€๋กœ ์‚ฌ์šฉ์ž๋ฅผ ์†์—ฌ ์•…์˜์ ์ธ ์›น์‚ฌ์ดํŠธ์— ์ ‘์†์„ ์œ ๋„ํ•˜๋Š” ๋ฐฉ๋ฒ•์œผ๋กœ ์ตœ๊ทผ ํ”ผํ•ด ์‚ฌ๋ก€๊ฐ€ ํฌ๊ฒŒ ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์Šค๋งˆํŠธํฐ์˜ ์Šค๋ฏธ์‹ฑ ๊ณต๊ฒฉ ๋ฐฉ์ง€ ๊ธฐ๋ฒ•์œผ๋กœ ๋ช‡ ๊ฐ€์ง€ ๊ธฐ๋ฒ•์„ ํ•ฉ์ณ Phishing URL Detector๋ฅผ ์ œ์•ˆํ•œ๋‹ค. ์ฒซ ๋‹จ๊ณ„์—์„œ๋Š” ์ ‘์†ํ•  URL์„ ๋ถ„์„ํ•˜์—ฌ ์•Œ๋ ค์ง„ ํ”ผ์‹ฑ URL ํŒจํ„ด์ด ํฌํ•จ๋œ ๊ฒฝ์šฐ ์ ‘์†์„ ์ฐจ๋‹จํ•œ๋‹ค. ๋‘ ๋ฒˆ์งธ ๋‹จ๊ณ„๋กœ ๋ชจ๋ฐ”์ผ ์›น ๋ธŒ๋ผ์šฐ์ €์˜ ๋ถ๋งˆํฌ์™€ ์ ‘์† ์ด๋ ฅ์„ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•œ whitelist๋ฅผ ๊ฒ€์ƒ‰ํ•ด ์ ‘์†ํ•  URL์ด ํฌํ•จ๋ผ ์žˆ์œผ๋ฉด ์•ˆ์ „ํ•œ ๊ฒƒ์œผ๋กœ ๊ฐ„์ฃผํ•˜๊ณ  ์ ‘์†์„ ํ—ˆ์šฉํ•œ๋‹ค. ์„ธ ๋ฒˆ์งธ ๋‹จ๊ณ„์—์„œ๋Š” blacklist๋ฅผ ๊ฒ€์ƒ‰ํ•˜์—ฌ ์ ‘์†ํ•  URL์ด ํฌํ•จ๋˜์–ด ์žˆ์œผ๋ฉด ์œ„ํ—˜ํ•œ URL๋กœ ๊ฐ„์ฃผํ•˜๊ณ  ์ ‘์†์„ ์ฐจ๋‹จํ•œ๋‹ค. ๋งˆ์ง€๋ง‰์€ URL์˜ ์•ˆ์ „์„ฑ์„ ํŒ๋‹จํ•  ์ˆ˜ ์—†๋Š” ๋‹จ๊ณ„์ด๋ฏ€๋กœ ์šฐ์„  URL์— ์ ‘์†ํ•œ ๋’ค ํ—ˆ์œ„ ์‚ฌ์šฉ์ž ์ •๋ณด๋ฅผ ์ž…๋ ฅํ•œ ๋’ค ์›น์‚ฌ์ดํŠธ์˜ ๋™์ž‘์„ ๋ถ„์„ํ•˜๊ณ  ํ”ผ์‹ฑ ์›น์‚ฌ์ดํŠธ์ธ์ง€ ํŒ๋ณ„ํ•œ๋‹ค. ์ด ๊ธฐ๋ฒ•์€ ์ž…๋ ฅํ•˜๋Š” ์ •๋ณด์˜ ์œ ํšจ์„ฑ์„ ์‹ค์‹œ๊ฐ„์œผ๋กœ ํ™•์ธํ•  ์ˆ˜ ์—†๊ณ , ๋ชจ๋‘ ์ž…๋ ฅ ๋˜์—ˆ๋Š”์ง€ ํ™•์ธ๋งŒ ๊ฐ€๋Šฅํ•˜๋‹ค๋Š” ํ”ผ์‹ฑ ์›น์‚ฌ์ดํŠธ์˜ ํŠน์ง•์„ ์ด์šฉํ•œ๋‹ค. ๋”ฐ๋ผ์„œ, ํ—ˆ์œ„ ์‚ฌ์šฉ์ž ์ •๋ณด์—๋„ ์œ ํšจ์„ฑ ๊ฒ€์‚ฌ ํ›„ ์žฌ์ž…๋ ฅ ์š”๊ตฌ ์—†์ด ๋‹ค๋ฅธ ๋™์ž‘์ด ์ง„ํ–‰๋œ๋‹ค๋ฉด ํ”ผ์‹ฑ ์›น์‚ฌ์ดํŠธ๋กœ ํŒ๋ณ„ํ•  ์ˆ˜ ์žˆ๋‹ค. URL์— ์ ‘์†ํ•ด ๋ณด๊ธฐ ์ „์—๋Š” ํ”ผ์‹ฑ URL ํŒ๋ณ„์ด ์–ด๋ ต๋‹ค๋Š” ๊ธฐ์กด์˜ ๋ฌธ์ œ์ ์„ ํ•ด๊ฒฐํ•  ์ˆ˜ ์žˆ๋Š” ๋ณธ ๊ธฐ๋ฒ•์€ ์Šค๋ฏธ์‹ฑ ๊ณต๊ฒฉ์„ ํšจ๊ณผ์ ์œผ๋กœ ๋ฐฉ์ง€ํ•  ์ˆ˜ ์žˆ๋Š” ์ฒซ ๋ฒˆ์งธ ๋ฐฉ์–ด๋ง‰์ด ๋  ์ˆ˜ ์žˆ๋‹ค.์š”์•ฝ ๋ชฉ์ฐจ ๊ทธ๋ฆผ ๋ชฉ์ฐจ ํ‘œ ๋ชฉ์ฐจ ์ œ 1 ์žฅ ์„œ๋ก  ์ œ 2 ์žฅ ์Šค๋ฏธ์‹ฑ ๊ณต๊ฒฉ 2.1 ๋ชจ๋ฐ”์ผ ํ”ผ์‹ฑ ๊ณต๊ฒฉ 2.2 ์Šค๋ฏธ์‹ฑ ๊ณต๊ฒฉ 2.3 ๊ด€๋ จ ์—ฐ๊ตฌ ์ œ 3 ์žฅ ์Šค๋ฏธ์‹ฑ ๊ณต๊ฒฉ ๋ฐฉ์ง€ ๊ธฐ๋ฒ• 3.1 ์Šค๋ฏธ์‹ฑ ๊ณต๊ฒฉ ํŠน์„ฑ ๋ถ„์„ 3.1.1 ์Šค๋ฏธ์‹ฑ ๊ณต๊ฒฉ ํ๋ฆ„ ๋ถ„์„ 3.1.2 ์Šค๋ฏธ์‹ฑ ๊ณต๊ฒฉ ํŠน์ง• ๋ถ„์„ 3.1.3 ์Šค๋ฏธ์‹ฑ SMS ํŠน์ง• ๋ถ„์„ 3.2 Phishing URL Detector ์ œ์•ˆ 3.2.1 ํ”ผ์‹ฑ ์›น์‚ฌ์ดํŠธ ๊ณตํ†ต ๋™์ž‘ ํŒจํ„ด ๋ถ„์„ 3.2.2 Phishing URL Detector ์ œ 4 ์žฅ ์‹คํ—˜ ๋ฐ ๊ตฌํ˜„ 4.1 ํ”ผ์‹ฑ ์›น์‚ฌ์ดํŠธ ๊ณตํ†ต ๋™์ž‘ ํŒจํ„ด ํ™•์ธ ์‹คํ—˜ 4.2 Phishing URL Detector ๊ตฌํ˜„ ์ œ 5 ์žฅ ๊ฒฐ๋ก  ์ฐธ๊ณ ๋ฌธํ—Œ AbstractMaste

    Human-centered Information Security and Privacy: Investigating How and Why Social and Emotional Factors Affect the Protection of Information Assets

    Get PDF
    Information systems (IS) are becoming increasingly integrated into the fabric of our everyday lives, for example, through cloud-based collaboration platforms, smart wearables, and social media. As a result, nearly every aspect of personal, social, and professional life relies on the constant exchange of information between users and online service providers. However, as users and organizations entrust more and more of their personal and sensitive information to IS, the challenges of ensuring information security and privacy become increasingly pressing, particularly given the rise of cybercrime and microtargeting capabilities. While the protection of information assets is a shared responsibility between technology providers, legislation, organizations, and individuals, previous research has emphasized the pivotal role of the user as the last line of defense. Whereas prior works on human-centered information security and privacy have primarily studied the human aspect from a cognitive perspective, it is important to acknowledge that security and privacy phenomena are deeply embedded within usersโ€™ social, emotional, and technological environment. Therefore, individual decision-making and organizational phenomena related to security and privacy need to be examined through a socio-emotional lens. As such, this thesis sets out to investigate how and why socio-emotional factors influence information security and privacy, while simultaneously providing a deeper understanding of how these insights can be utilized to design effective security and privacy-enhancing tools and interventions. This thesis includes five studies that have been published in peer-reviewed IS outlets. The first strand of this thesis investigates individual decision-making related to information security and privacy. Daily information disclosure decisions, such as providing login credentials to a phishing website or giving apps access to oneโ€™s address book, crucially affect information security and privacy. In an effort to support users in their decision-making, research and practice have begun to develop tools and interventions that promote secure and privacy-aware behavior. However, our knowledge on the design and effectiveness of such tools and interventions is scattered across a diverse research landscape. Therefore, the first study of this thesis (article A) sets out to systematize this knowledge. Through a literature review, the study presents a taxonomy of user-oriented information security interventions and highlights crucial shortcomings of current approaches, such as a lack of tools and interventions that provide users with long-term guidance and an imbalance regarding cyber attack vectors. Importantly, the study confirms that prior works in this field tend to limit their scope to a cognitive processing perspective, neglecting the influence of social and emotional factors. The second study (article B) examines how users make decisions on disclosing their peersโ€™ personal information, a phenomenon referred to as privacy interdependence. Previous research has shown that users tend to have a limited understanding of the social ramifications of their decisions to share information, that is, the impact of their disclosure decisions on othersโ€™ privacy. The study is based on a theoretical framework that suggests that for a user, recognizing and respecting othersโ€™ privacy rights is heavily influenced by the perceived salience of others within their own socio-technical environment. The study introduces an intervention aimed at increasing the salience of othersโ€™ personal data during the decision-making process, resulting in a significant decrease of interdependent privacy infringements. These findings indicate that current interfaces do not allow users to make informed decisions about their peersโ€™ privacy โ€“ a problem that is highly relevant for policymakers and regulators. Shifting the focus towards an organizational context of individual security decision-making, the third study (article C) investigates employeesโ€™ underlying motives for reporting cyber threats. With the aim to maximize employeesโ€™ adoption of reporting tools, the study examines the effect of two tool design features on usersโ€™ utilitarian and hedonic motivation to report information security incidents. The findings suggest that reporting tools that elicit a sense of warm glow, that is, a boost of self-esteem and personal satisfaction after performing an altruistic act, result in higher tool adoption compared to those that address solely usersโ€™ utilitarian motivation. This unlocks a new perspective on organizational information security as a whole and showcases new ways in which organizations can engage users in promoting information security. The second strand of this thesis focuses on the context of organizational information security. Beyond individual decision-making, organizations face the challenge of maintaining an information security culture, including, for example, employeesโ€™ awareness of security risks, top management commitment, and interdepartmental collaboration with regard to security issues. The fourth study (article D) presents a measurement instrument to assess employeesโ€™ security awareness. Complementary to the predominant method of self-reported surveys, the study introduces an index based on employeesโ€™ susceptibility to simulated social engineering attacks. As such, it presents a novel way to measure security awareness that closes the intention-behavior gap and enables information security officers to nonintrusively monitor human vulnerabilities in real-time. Furthermore, the findings indicate that security education, training and awareness (SETA) programs not only increase employeesโ€™ awareness of information security risks, but also improve their actual security behavior. Finally, the fifth study (article E) investigates the influence of external socio-emotional disruption on information security culture. Against the backdrop of the COVID-19 pandemic, the longitudinal study reveals novel inhibitors and facilitators of information security culture that emerged in the face of global socially and emotionally disruptive change over the course of 2020. Specifically, the study demonstrates that such disruptive events can influence information security culture negatively, or โ€“ counterintuitively โ€“ positively, depending on prerequisites such as digital maturity and economic stability. Overall, this thesis highlights the importance of considering socio-emotional factors in protecting information assets by providing a more comprehensive understanding of why and how such factors affect human behavior related to information security and privacy. By doing so, this thesis answers calls for research that urge scholars to consider security and privacy issues in a larger social and emotional context. The studies in this thesis contribute to IS research on information security and privacy by (1) uncovering social and emotional motives as hitherto largely neglected drivers of users decision-making, (2) demonstrating how tools and interventions can leverage these motives to improve usersโ€™ protection of information assets, and (3) revealing the importance of external socio-emotional factors as a thus far under-investigated influence on organizational information security. In practice, this thesis offers actionable recommendations for designers building tools and interventions to support decision-making with regard to information security and privacy. Likewise, it provides important insights to information security officers on how to build a strong and resilient information security culture, and guides policymakers in accounting for socially embedded privacy phenomena
    corecore