Loading [MathJax]/extensions/MathMenu.js
A Serious Game for Eliciting Social Engineering Security Requirements | IEEE Conference Publication | IEEE Xplore

A Serious Game for Eliciting Social Engineering Security Requirements


Abstract:

Social engineering is the acquisition of information about computer systems by methods that deeply include nontechnical means. While technical security of most critical s...Show More

Abstract:

Social engineering is the acquisition of information about computer systems by methods that deeply include nontechnical means. While technical security of most critical systems is high, the systems remain vulnerable to attacks from social engineers. Social engineering is a technique that: (i) does not require any (advanced) technical tools, (ii) can be used by anyone, (iii) is cheap. Traditional security requirements elicitation approaches often focus on vulnerabilities in network or software systems. Few approaches even consider the exploitation of humans via social engineering and none of them elicits personal behaviours of individual employees. While the amount of social engineering attacks and the damage they cause rise every year, the security awareness of these attacks and their consideration during requirements elicitation remains negligible. We propose to use a card game to elicit these requirements, which all employees of a company can play to understand the threat and document security requirements. The game considers the individual context of a company and presents underlying principles of human behaviour that social engineers exploit, as well as concrete attack patterns. We evaluated our approach with several groups of researchers, IT administrators, and professionals from industry.
Date of Conference: 12-16 September 2016
Date Added to IEEE Xplore: 05 December 2016
ISBN Information:
Electronic ISSN: 2332-6441
Conference Location: Beijing, China

Contact IEEE to Subscribe

References

References is not available for this document.