网络钓鱼电子邮件诈骗的安全意识策略:以新加坡某公司为例

Q3 Decision Sciences
Widia Febriyani, Dhiya Fathia, Adityas Widjajarto, Muharman Lubis
{"title":"网络钓鱼电子邮件诈骗的安全意识策略:以新加坡某公司为例","authors":"Widia Febriyani, Dhiya Fathia, Adityas Widjajarto, Muharman Lubis","doi":"10.30630/joiv.7.3.2081","DOIUrl":null,"url":null,"abstract":"Social Engineering Procedures and phishing are some of the standard procedures and problems today, mainly through sophisticated media such as email, the official means of communication companies use. Phishing emails are usually associated with Social Designing. They can be sent via joins and connections in this email, but they are not secure. Proliferation can be hacked into private/confidential data or total control over the computer/Email without the client's knowledge. The method used in this research is a cycle that will run continuously in a life cycle, starting from problem identification, then generating ideas and evaluating the Implementation of solutions. At each stage, a thorough checking process is needed to obtain results. Follow what you want. Achieved. The results of this study provide recommendations and some suggestions that companies can make; this aims to be one of the doors that provides restrictions for access from parties who are not entitled to access the application. Some thought has shown that this attack is growing and affecting the population. The evaluation stages in this study consist of 5 phases. Each phase is a step used to prevent both the system and the behavior in the company. Awareness is critical at the start considering this is the basis for the organization to determine who will take care of the personnel's knowledge related to information security. It thinks about using survey writing strategies and recommendations that can be made in anticipation of an attack, such as setting up representation or attention as early and often as possible.","PeriodicalId":32468,"journal":{"name":"JOIV International Journal on Informatics Visualization","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security Awareness Strategy for Phishing Email Scams: A Case Study One of a Company in Singapore\",\"authors\":\"Widia Febriyani, Dhiya Fathia, Adityas Widjajarto, Muharman Lubis\",\"doi\":\"10.30630/joiv.7.3.2081\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Social Engineering Procedures and phishing are some of the standard procedures and problems today, mainly through sophisticated media such as email, the official means of communication companies use. Phishing emails are usually associated with Social Designing. They can be sent via joins and connections in this email, but they are not secure. Proliferation can be hacked into private/confidential data or total control over the computer/Email without the client's knowledge. The method used in this research is a cycle that will run continuously in a life cycle, starting from problem identification, then generating ideas and evaluating the Implementation of solutions. At each stage, a thorough checking process is needed to obtain results. Follow what you want. Achieved. The results of this study provide recommendations and some suggestions that companies can make; this aims to be one of the doors that provides restrictions for access from parties who are not entitled to access the application. Some thought has shown that this attack is growing and affecting the population. The evaluation stages in this study consist of 5 phases. Each phase is a step used to prevent both the system and the behavior in the company. Awareness is critical at the start considering this is the basis for the organization to determine who will take care of the personnel's knowledge related to information security. It thinks about using survey writing strategies and recommendations that can be made in anticipation of an attack, such as setting up representation or attention as early and often as possible.\",\"PeriodicalId\":32468,\"journal\":{\"name\":\"JOIV International Journal on Informatics Visualization\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"JOIV International Journal on Informatics Visualization\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30630/joiv.7.3.2081\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Decision Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOIV International Journal on Informatics Visualization","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30630/joiv.7.3.2081","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Decision Sciences","Score":null,"Total":0}
引用次数: 0

摘要

社会工程程序和网络钓鱼是今天的一些标准程序和问题,主要通过复杂的媒体,如电子邮件,公司使用的官方通信手段。钓鱼邮件通常与社交设计有关。它们可以通过本电子邮件中的join和connection发送,但它们不安全。扩散可以在客户不知情的情况下侵入私人/机密数据或完全控制计算机/电子邮件。本研究中使用的方法是一个将在生命周期中持续运行的循环,从问题识别开始,然后产生想法并评估解决方案的实施。在每个阶段,都需要一个彻底的检查过程来获得结果。跟随你想要的。实现。本研究的结果为企业提供了建议和建议;这是为无权访问应用程序的各方提供访问限制的一扇门。一些人认为,这种袭击正在增加,并影响到人口。本研究的评估阶段分为5个阶段。每个阶段都是用来防止系统和公司行为的一个步骤。意识在开始时是至关重要的,因为这是组织确定谁将负责与信息安全相关的人员知识的基础。它考虑使用调查写作策略和建议,这些策略和建议可以在预期攻击时提出,例如尽可能早且经常地设置代表或关注。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Security Awareness Strategy for Phishing Email Scams: A Case Study One of a Company in Singapore
Social Engineering Procedures and phishing are some of the standard procedures and problems today, mainly through sophisticated media such as email, the official means of communication companies use. Phishing emails are usually associated with Social Designing. They can be sent via joins and connections in this email, but they are not secure. Proliferation can be hacked into private/confidential data or total control over the computer/Email without the client's knowledge. The method used in this research is a cycle that will run continuously in a life cycle, starting from problem identification, then generating ideas and evaluating the Implementation of solutions. At each stage, a thorough checking process is needed to obtain results. Follow what you want. Achieved. The results of this study provide recommendations and some suggestions that companies can make; this aims to be one of the doors that provides restrictions for access from parties who are not entitled to access the application. Some thought has shown that this attack is growing and affecting the population. The evaluation stages in this study consist of 5 phases. Each phase is a step used to prevent both the system and the behavior in the company. Awareness is critical at the start considering this is the basis for the organization to determine who will take care of the personnel's knowledge related to information security. It thinks about using survey writing strategies and recommendations that can be made in anticipation of an attack, such as setting up representation or attention as early and often as possible.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
JOIV International Journal on Informatics Visualization
JOIV International Journal on Informatics Visualization Decision Sciences-Information Systems and Management
CiteScore
1.40
自引率
0.00%
发文量
100
审稿时长
16 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信