Training Security Professionals in Social Engineering with OSINT and Sieve
This research attempts to create a novel process, Social Engineering Vulnerability Evaluation, SiEVE, to use open source data and open source intelligence (OSINT) to perform efficient and effectiveness spear phishing attacks. It is designed for use by "œred teams" and students learning to...
Main Author: | |
---|---|
Format: | Others |
Published: |
BYU ScholarsArchive
2018
|
Subjects: | |
Online Access: | https://scholarsarchive.byu.edu/etd/6863 https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7863&context=etd |
id |
ndltd-BGMYU2-oai-scholarsarchive.byu.edu-etd-7863 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-BGMYU2-oai-scholarsarchive.byu.edu-etd-78632021-09-12T05:01:17Z Training Security Professionals in Social Engineering with OSINT and Sieve Meyers, Jared James This research attempts to create a novel process, Social Engineering Vulnerability Evaluation, SiEVE, to use open source data and open source intelligence (OSINT) to perform efficient and effectiveness spear phishing attacks. It is designed for use by "œred teams" and students learning to conduct a penetration test of an organization, using the vector of their workforce. The SiEVE process includes the stages of identifying targets, profiling the targets, and creating spear phishing attacks for the targets. The contributions of this research include the following: (1) The SiEVE process itself was developed using an iterative process to identify and fix initial shortcomings; (2) Each stage of the final version of the SiEVE process was evaluated in an experiment that compared performance of students using SiEVE against performance of those not using SiEVE in order to test effectiveness of the SiEVE process in a learning environment; Specifically, the study showed that those using the SiEVE process (a) did not identify more targets, (b) did identify more information about targets, and (c) did lead to more effective spear phishing attacks. The findings, limitations, and future work are discussed in order to provide next steps in developing formalized processes for red teams and students learning penetration testing. 2018-06-01T07:00:00Z text application/pdf https://scholarsarchive.byu.edu/etd/6863 https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7863&context=etd http://lib.byu.edu/about/copyright/ Theses and Dissertations BYU ScholarsArchive social engineering open source intelligence ethics IEEE ACM red team cyber kill chain cyber security Science and Technology Studies |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
social engineering open source intelligence ethics IEEE ACM red team cyber kill chain cyber security Science and Technology Studies |
spellingShingle |
social engineering open source intelligence ethics IEEE ACM red team cyber kill chain cyber security Science and Technology Studies Meyers, Jared James Training Security Professionals in Social Engineering with OSINT and Sieve |
description |
This research attempts to create a novel process, Social Engineering Vulnerability Evaluation, SiEVE, to use open source data and open source intelligence (OSINT) to perform efficient and effectiveness spear phishing attacks. It is designed for use by "œred teams" and students learning to conduct a penetration test of an organization, using the vector of their workforce. The SiEVE process includes the stages of identifying targets, profiling the targets, and creating spear phishing attacks for the targets. The contributions of this research include the following: (1) The SiEVE process itself was developed using an iterative process to identify and fix initial shortcomings; (2) Each stage of the final version of the SiEVE process was evaluated in an experiment that compared performance of students using SiEVE against performance of those not using SiEVE in order to test effectiveness of the SiEVE process in a learning environment; Specifically, the study showed that those using the SiEVE process (a) did not identify more targets, (b) did identify more information about targets, and (c) did lead to more effective spear phishing attacks. The findings, limitations, and future work are discussed in order to provide next steps in developing formalized processes for red teams and students learning penetration testing. |
author |
Meyers, Jared James |
author_facet |
Meyers, Jared James |
author_sort |
Meyers, Jared James |
title |
Training Security Professionals in Social Engineering with OSINT and Sieve |
title_short |
Training Security Professionals in Social Engineering with OSINT and Sieve |
title_full |
Training Security Professionals in Social Engineering with OSINT and Sieve |
title_fullStr |
Training Security Professionals in Social Engineering with OSINT and Sieve |
title_full_unstemmed |
Training Security Professionals in Social Engineering with OSINT and Sieve |
title_sort |
training security professionals in social engineering with osint and sieve |
publisher |
BYU ScholarsArchive |
publishDate |
2018 |
url |
https://scholarsarchive.byu.edu/etd/6863 https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7863&context=etd |
work_keys_str_mv |
AT meyersjaredjames trainingsecurityprofessionalsinsocialengineeringwithosintandsieve |
_version_ |
1719480395128373248 |