Social Engineering via Personality Psychology - Bypassing Users Based on Their Personality Pattern To Raise Security Awareness

Abdulateef M. Yaser Al-Bustani, Abdulatif Almutairi, Abdullah AlRashed, A. W. Muzaffar
{"title":"Social Engineering via Personality Psychology - Bypassing Users Based on Their Personality Pattern To Raise Security Awareness","authors":"Abdulateef M. Yaser Al-Bustani, Abdulatif Almutairi, Abdullah AlRashed, A. W. Muzaffar","doi":"10.1109/ITIKD56332.2023.10100048","DOIUrl":null,"url":null,"abstract":"In this research, we applied personality psychology within Social Engineering to raise security awareness and identify the awareness level of the Dominance, Influence, Steadiness, and Conscientiousness (DiSC) Personality Model of William Moulton Marston, 1928. By convincing people to click a scam but safe URL through an email message (URL Phishing) phrased to be convincing based on every person's personality pattern, we were able to effectively conduct this pilot study. This URL forwards the user (or victim) to a safe landing page with a security warning, and countermeasures suggested by the U.S. Department of Homeland Security to apply to avoid falling victim to similar attacks, thus raising security awareness. The first goal of this work was to build and analyze a data set of 86 applicants' that contained their name, age, gender, email, and personality pattern. This information was collected through the RBYG TEST by Abdulateef Al-Bustani, 2020, a short personality test of 3 precisely made questions. Accordingly, based on each applicant's behavioral pattern, several social engineering attack scenarios were applied in two stages, Attack 1 & Attack 2, and vulnerability scores were recorded to identify the awareness level of all behavioral patterns in the DiSC Personality Model. We concluded that the most secure personality pattern with the highest awareness level is “Y” / “Influence”, then “B” / “Conscientious”, then “G” / “Stability”, and the weakest is “R”/ “Dominance”. The results of this study can be used as a guide for organizations to raise security awareness, especially for people with the lowest awareness level.","PeriodicalId":283631,"journal":{"name":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITIKD56332.2023.10100048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In this research, we applied personality psychology within Social Engineering to raise security awareness and identify the awareness level of the Dominance, Influence, Steadiness, and Conscientiousness (DiSC) Personality Model of William Moulton Marston, 1928. By convincing people to click a scam but safe URL through an email message (URL Phishing) phrased to be convincing based on every person's personality pattern, we were able to effectively conduct this pilot study. This URL forwards the user (or victim) to a safe landing page with a security warning, and countermeasures suggested by the U.S. Department of Homeland Security to apply to avoid falling victim to similar attacks, thus raising security awareness. The first goal of this work was to build and analyze a data set of 86 applicants' that contained their name, age, gender, email, and personality pattern. This information was collected through the RBYG TEST by Abdulateef Al-Bustani, 2020, a short personality test of 3 precisely made questions. Accordingly, based on each applicant's behavioral pattern, several social engineering attack scenarios were applied in two stages, Attack 1 & Attack 2, and vulnerability scores were recorded to identify the awareness level of all behavioral patterns in the DiSC Personality Model. We concluded that the most secure personality pattern with the highest awareness level is “Y” / “Influence”, then “B” / “Conscientious”, then “G” / “Stability”, and the weakest is “R”/ “Dominance”. The results of this study can be used as a guide for organizations to raise security awareness, especially for people with the lowest awareness level.
基于人格心理学的社会工程——基于人格模式绕过用户提高安全意识
在本研究中,我们将人格心理学应用于社会工程中,以提高安全意识,并确定William Moulton Marston(1928)的支配、影响、稳定和尽责(DiSC)人格模型的意识水平。根据每个人的个性模式,我们通过电子邮件(URL Phishing)的措辞令人信服,说服人们点击一个骗局但安全的URL,从而有效地开展了这项试点研究。该URL将用户(或受害者)转发到一个安全的登陆页面,该页面带有安全警告,以及美国国土安全部建议的应对措施,以避免成为类似攻击的受害者,从而提高安全意识。这项工作的第一个目标是建立并分析86名申请人的数据集,其中包含他们的姓名、年龄、性别、电子邮件和性格模式。这些信息是通过ababdulateef Al-Bustani的RBYG TEST收集的,2020,这是一个由3个精确设置的问题组成的简短性格测试。因此,根据每个申请人的行为模式,在攻击1和攻击2两个阶段应用了几个社会工程攻击场景,并记录漏洞得分,以识别DiSC人格模型中所有行为模式的认知水平。结果表明,意识水平最高、最安全的人格模式是“Y”/“影响力”,其次是“B”/“尽责”,然后是“G”/“稳定”,最弱的是“R”/“支配”。本研究的结果可以作为组织提高安全意识的指南,特别是对于意识水平最低的人。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信