Training Security Professionals in Social Engineering with OSINT and Sieve

This research attempts to create a novel process, Social Engineering Vulnerability Evaluation, SiEVE, to use open source data and open source intelligence (OSINT) to perform efficient and effectiveness spear phishing attacks. It is designed for use by "œred teams" and students learning to...

Full description

Bibliographic Details
Main Author: Meyers, Jared James
Format: Others
Published: BYU ScholarsArchive 2018
Subjects:
ACM
Online Access:https://scholarsarchive.byu.edu/etd/6863
https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7863&context=etd
id ndltd-BGMYU2-oai-scholarsarchive.byu.edu-etd-7863
record_format oai_dc
spelling ndltd-BGMYU2-oai-scholarsarchive.byu.edu-etd-78632021-09-12T05:01:17Z Training Security Professionals in Social Engineering with OSINT and Sieve Meyers, Jared James This research attempts to create a novel process, Social Engineering Vulnerability Evaluation, SiEVE, to use open source data and open source intelligence (OSINT) to perform efficient and effectiveness spear phishing attacks. It is designed for use by "œred teams" and students learning to conduct a penetration test of an organization, using the vector of their workforce. The SiEVE process includes the stages of identifying targets, profiling the targets, and creating spear phishing attacks for the targets. The contributions of this research include the following: (1) The SiEVE process itself was developed using an iterative process to identify and fix initial shortcomings; (2) Each stage of the final version of the SiEVE process was evaluated in an experiment that compared performance of students using SiEVE against performance of those not using SiEVE in order to test effectiveness of the SiEVE process in a learning environment; Specifically, the study showed that those using the SiEVE process (a) did not identify more targets, (b) did identify more information about targets, and (c) did lead to more effective spear phishing attacks. The findings, limitations, and future work are discussed in order to provide next steps in developing formalized processes for red teams and students learning penetration testing. 2018-06-01T07:00:00Z text application/pdf https://scholarsarchive.byu.edu/etd/6863 https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7863&context=etd http://lib.byu.edu/about/copyright/ Theses and Dissertations BYU ScholarsArchive social engineering open source intelligence ethics IEEE ACM red team cyber kill chain cyber security Science and Technology Studies
collection NDLTD
format Others
sources NDLTD
topic social engineering
open source intelligence
ethics
IEEE
ACM
red team
cyber kill chain
cyber security
Science and Technology Studies
spellingShingle social engineering
open source intelligence
ethics
IEEE
ACM
red team
cyber kill chain
cyber security
Science and Technology Studies
Meyers, Jared James
Training Security Professionals in Social Engineering with OSINT and Sieve
description This research attempts to create a novel process, Social Engineering Vulnerability Evaluation, SiEVE, to use open source data and open source intelligence (OSINT) to perform efficient and effectiveness spear phishing attacks. It is designed for use by "œred teams" and students learning to conduct a penetration test of an organization, using the vector of their workforce. The SiEVE process includes the stages of identifying targets, profiling the targets, and creating spear phishing attacks for the targets. The contributions of this research include the following: (1) The SiEVE process itself was developed using an iterative process to identify and fix initial shortcomings; (2) Each stage of the final version of the SiEVE process was evaluated in an experiment that compared performance of students using SiEVE against performance of those not using SiEVE in order to test effectiveness of the SiEVE process in a learning environment; Specifically, the study showed that those using the SiEVE process (a) did not identify more targets, (b) did identify more information about targets, and (c) did lead to more effective spear phishing attacks. The findings, limitations, and future work are discussed in order to provide next steps in developing formalized processes for red teams and students learning penetration testing.
author Meyers, Jared James
author_facet Meyers, Jared James
author_sort Meyers, Jared James
title Training Security Professionals in Social Engineering with OSINT and Sieve
title_short Training Security Professionals in Social Engineering with OSINT and Sieve
title_full Training Security Professionals in Social Engineering with OSINT and Sieve
title_fullStr Training Security Professionals in Social Engineering with OSINT and Sieve
title_full_unstemmed Training Security Professionals in Social Engineering with OSINT and Sieve
title_sort training security professionals in social engineering with osint and sieve
publisher BYU ScholarsArchive
publishDate 2018
url https://scholarsarchive.byu.edu/etd/6863
https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7863&context=etd
work_keys_str_mv AT meyersjaredjames trainingsecurityprofessionalsinsocialengineeringwithosintandsieve
_version_ 1719480395128373248