Abstract

Phishing attacks are cybersecurity threats that have become increasingly sophisticated. Phishing is a cyberattack that can be carried out using various approaches and techniques. Usually, an attacker uses trickery as well as fraudulent and disguised means to steal valuable personal information or to deceive the victim into running malicious code, thereby gaining access and controlling the victim’s systems. This study focuses on evaluating the level of cybersecurity knowledge and cyber awareness in Saudi Arabia. It is aimed at assessing end-user susceptibility through three phishing attack simulations. Furthermore, we elaborate on some of the concepts related to phishing attacks and review the steps required to launch such attacks. Subsequently, we briefly discuss the tools and techniques associated with each attack simulation. Finally, a comprehensive analysis is conducted to assess and evaluate the results.

Highlights

  • The utilisation of information and communications technologies has led to unprecedented advances in our daily lives and resulted in an increase in the usage and production of electronic devices

  • Social networking-based phishing (SNP): By posing as a trustworthy person or legitimate information and breaching the security of the local computer by redirecting the user to pages organisation, a phisher uses social media (e.g., Twitter, LinkedIn, and Google Plus) as a means infected with malware [13]

  • We presented an experiment conducted in Saudi Arabia to assess and measure the security awareness of end users in Saudi Arabia

Read more

Summary

Introduction

The utilisation of information and communications technologies has led to unprecedented advances in our daily lives and resulted in an increase in the usage and production of electronic devices. A dramatic increase in the number of cybercrimes has been witnessed worldwide These crimes have been successfully committed through the Internet and include fraud, identity theft, scams, cyberstalking, and even cyber terrorism [1,2,3]. We systematically analyse each attack and discuss the impact factors from the victim’s perspective This analysis can facilitate the understanding of user behaviour and the development of security awareness. Hypothesis: The experiment assumed that end users in Saudi Arabia are not sufficiently knowledgeable regarding cyberattacks They lack the ability to protect themselves against various types of phishing attacks.

Types of Phishing
Website
Launching Website Phishing Attack through Cloning
Fake page of of KAU
Warning
Under-Control Group
Analysis of the page
Discussion
Domain Spoofing through Email Phishing
Structure of the ‘Awareness Page’ of the Phishing Website
Result of Spear-Phishing Email
Social Networking-Based Phishing Attack Simulation
10. Percentage
13. Warning page for for the the ‘Madar’
15. The reason this declinedecrease reflects the victims’
Findings
Related Works
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.