Security Awareness, Social Engineering and Insider Threats

This module examines the human factors in cybersecurity, particularly focusing on security awareness, social engineering tactics, and the risks posed by insider threats. It covers strategies to educate employees, methods used by attackers to exploit human vulnerabilities, and approaches to mitigate the risk of insider breaches.

Portal > Cybersecurity > Security Awareness, Social Engineering and Insider Threats

Curriculum Builder

Atkins, Christopher. Phishing Attacks: Advanced Attack Techniques. 2nd ed. NY: Independently Published, 2021.

Bittau, Andrea, Adam Belay, Ali Mashtizadeh, David Mazieres, and Dan Boneh. “Hacking Blind.” In 2014 IEEE Symposium on Security and Privacy, 227–42. San Jose, CA: IEEE, 2014.

https://doi.org/10.1109/SP.2014.22

Corradini, Isabella. Building a Cybersecurity Culture in Organizations: How to Bridge the Gap Between People and Digital Technology. Vol. 284. Studies in Systems, Decision and Control. Cham: Springer International Publishing, 2020.

https://doi.org/10.1007/978-3-030-43999-6

Solove, Daniel J. “Introduction: Privacy Self-Management and the Consent Dilemma.” Harvard Law Review 126, no. 7 (May 20, 2013).

https://harvardlawreview.org/print/vol-126/introduction-privacy-self-management-and-the-consent-dilemma/

Ur, Blase, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. “‘I Added “!” at the End to Make It Secure’: Observing Password Creation in the Lab.” In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security, 123–40. SOUPS ’15. USA: USENIX Association, 2015.

Wen, Zikai Alex, Zhiqiu Lin, Rowena Chen, and Erik Andersen. “What.Hack: Engaging Anti-Phishing Training Through a Role-Playing Phishing Simulation Game.” In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 1–12. Glasgow Scotland Uk: ACM, 2019.

https://doi.org/10.1145/3290605.3300338

Wash, Rick, and Molly M. Cooper. “Who Provides Phishing Training?: Facts, Stories, and People Like Me.” In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 1–12. Montreal QC Canada: ACM, 2018.

https://doi.org/10.1145/3173574.3174066

Thank you for signing up to our newsletter!

Thank you! RSVP received for Atkins, Christopher. Phishing Attacks: Advanced Attack Techniques. 2nd ed. NY: Independently Published, 2021.

Thank you for applying! We will be in touch.

Apply for: Atkins, Christopher. Phishing Attacks: Advanced Attack Techniques. 2nd ed. NY: Independently Published, 2021.

Atkins, Christopher. Phishing Attacks: Advanced Attack Techniques. 2nd ed. NY: Independently Published, 2021.

Loading...

Loading…