Authors
Kristian Beckers, Sebastian Pape
Publication date
2016/9/12
Conference
2016 IEEE 24th International Requirements Engineering Conference (RE)
Pages
16-25
Publisher
IEEE
Description
Social engineering is the acquisition of information about computer systems by methods that deeply include nontechnical means. While technical security of most critical systems is high, the systems remain vulnerable to attacks from social engineers. Social engineering is a technique that: (i) does not require any (advanced) technical tools, (ii) can be used by anyone, (iii) is cheap. Traditional security requirements elicitation approaches often focus on vulnerabilities in network or software systems. Few approaches even consider the exploitation of humans via social engineering and none of them elicits personal behaviours of individual employees. While the amount of social engineering attacks and the damage they cause rise every year, the security awareness of these attacks and their consideration during requirements elicitation remains negligible. We propose to use a card game to elicit these requirements …
Total citations
20162017201820192020202120222023202437918202316218
Scholar articles
K Beckers, S Pape - 2016 IEEE 24th International Requirements …, 2016