{"title":"Phishing as a Cyber Security Threat","authors":"M. Madleňák, K. Kampová","doi":"10.1109/ICETA57911.2022.9974817","DOIUrl":null,"url":null,"abstract":"The aim of this article is to present the threat of phishing within the issue of cyber security and education as one of the tools to reduce it. The article presents procedures for verifying the level of awareness of this threat in a group of selected employees of medical facilities. These procedures consist of a theoretical and a practical part. The theoretical part defines the basic framework of phishing attacks. It describes the basic knowledge and definitions that need to be mastered to understand the given area. The practical part consists of testing the readiness of a specific reference group of users through phishing trainings and phishing tests. The data collected from the testing was further analyzed and compared to determine the potential use of phishing training and phishing testing in organizations.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETA57911.2022.9974817","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The aim of this article is to present the threat of phishing within the issue of cyber security and education as one of the tools to reduce it. The article presents procedures for verifying the level of awareness of this threat in a group of selected employees of medical facilities. These procedures consist of a theoretical and a practical part. The theoretical part defines the basic framework of phishing attacks. It describes the basic knowledge and definitions that need to be mastered to understand the given area. The practical part consists of testing the readiness of a specific reference group of users through phishing trainings and phishing tests. The data collected from the testing was further analyzed and compared to determine the potential use of phishing training and phishing testing in organizations.