skip to main content
10.1145/3368691.3368705acmotherconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

The status of information security systems in banking sector from social engineering perspective

Published:02 December 2019Publication History

Editorial Notes

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the DATA 2019 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

ABSTRACT

Social Engineering Attack has recently become a real threat affecting organizations, and 53.9% of such attacks target the banking sector. Successful attacks violate privacy by breaching sensitive data, and can cause huge financial loss for organizations and individuals, alongside reputational damage for firms. Although banks invest extensive resources in cyber security, with large budgets spent on securing their hardware and software, the human factor offers numerous weaknesses that can be easily exploited, and real and pertinent security challenges remain serious threats. This paper presents an information technology governance framework applied on a Jordanian bank to protect the system from social engineering attack. We worked on a case study that mainly focuses on phishing attack, which is considered one of the most common threats in banks, and the way staff will deal with it. The results show positive improvements in staff awareness and in avoiding such types of attacks, as well as a marked increase in reporting any suspicious activity noticed by employees.

References

  1. S. Muslah Albladi and G. R. S. Weir, "A Conceptual Model to Predict Social Engineering Victims," 12th International Conference on Global Security, Safety and Sustainability (ICGS3), London, United Kingdom, 2019, pp. 212--212..Google ScholarGoogle Scholar
  2. Anti-Phishing Working Group, APWG Phishing Attack Trends Report, 3Q, 2018.Google ScholarGoogle Scholar
  3. Amir Mohammad Fathollahi-Fard, Mostafa Hajiaghaei-Keshteli, Reza Tavakkoli-Moghaddam, "The Social Engineering Optimizer (SEO)", Engineering Applications of Artificial Intelligence, Vol 72, 2018, pp.267--293.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C, Ajaegbu & Adesegun, Oreoluwa & Y.A., Adekunle & Oludele, Awodele. H. Wilcox and M. Bhattacharya, "A framework to mitigate social engineering through social media within the enterprise," 11th Industrial Electronics and Applications (ICIEA), Hefei, 2016, pp. 1039--1044.Google ScholarGoogle Scholar
  5. Fatima Salahdine, Naima Kaabouch. "Social Engineering Attacks: A Survey", Future Internet, 11(4), 2019.Google ScholarGoogle Scholar
  6. M. Junger, L. Montoya, F-J. Overink." Priming and Warnings Are Not Effective To Prevent Social Engineering Attacks". Computers in Human Behavior, Vol 66, 2017, pp. 75--87.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Maher Aburrous • M. A. Hossain • Keshav Dahal. "Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies", Cognitive Computation, 2(3), 2010, pp 242--253.Google ScholarGoogle ScholarCross RefCross Ref
  8. M. Bezuidenhout, F. Mouton and H. S. Venter, "Social engineering attack detection model: SEADM," 2010 Information Security for South Africa, Sandton, Johannesburg, 2010, pp. 1--8.Google ScholarGoogle Scholar
  9. Matthew Edwards, Robert Larson, Benjamin Green, Awais Rashid, Alistair Baron. (2016). "Panning for gold: automatically analysing online social engineering attack surfaces", Computers & Security, vol 66, 2017, pp. 18--34.Google ScholarGoogle Scholar
  10. Malik Qasaimeh, Raad S. Al-Qassas, Shadi Aljawarneh, "Recent Development in Smart Grid Authentication Approaches: A Systematic Literature Review", Cybernetics and Information Technologies, vol 19, no 1, 2019.Google ScholarGoogle Scholar
  11. Macharia Kiama. "Social Engineering: Managing the Human Element of Information Security in the Organization", master thesis,. university of Nairobi, 2016.Google ScholarGoogle Scholar
  12. S. Gupta, A. Singhal and A. Kapoor, "A literature survey on social engineering attacks: Phishing attack," 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, 2016, pp. 537--540.Google ScholarGoogle Scholar
  13. V. Lyashenko, O. Kobylin and M. Minenko, "Tools for Investigating the Phishing Attacks Dynamics," International Scientific-Practical Conference Problems of Infocommunications. Science and Technology, Kharkiv, Ukraine, 2018, pp. 43--46.Google ScholarGoogle Scholar
  14. C. Lekati, "Complexities in Investigating Cases of Social Engineering: How Reverse Engineering and Profiling can Assist in the Collection of Evidence," 11th International Conference on IT Security Incident Management & IT Forensics, Hamburg, 2018, pp. 107--109.Google ScholarGoogle Scholar
  15. Mahmood Alsaadi, Malik Qasaimeh, Sara Tedmori, "HIPAA Security and Privacy Rules Auditing in Extreme Programming Environments", International Journal of Information Systems in the Service Sector, vol 9, no.1, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Central Bank of Jordan, Information and Technology Governance Regulations number, ISACA, (65/2016), 2016.Google ScholarGoogle Scholar
  17. ScanWave Information Security Consultants Company, Phishing Statistics in Jordan and worldwide: http://www.scanwave.org/, last accessed: 03/06/19Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    DATA '19: Proceedings of the Second International Conference on Data Science, E-Learning and Information Systems
    December 2019
    376 pages
    ISBN:9781450372848
    DOI:10.1145/3368691

    Copyright © 2019 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 2 December 2019

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    DATA '19 Paper Acceptance Rate58of146submissions,40%Overall Acceptance Rate74of167submissions,44%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader