Post on 04-Jun-2018
transcript
8/13/2019 Unintentional Insider Threats: Social Engineering
1/109
http://www.sei.cmu.edu/8/13/2019 Unintentional Insider Threats: Social Engineering
2/109
mailto:permission@sei.cmu.edu8/13/2019 Unintentional Insider Threats: Social Engineering
3/109
8/13/2019 Unintentional Insider Threats: Social Engineering
4/109
8/13/2019 Unintentional Insider Threats: Social Engineering
5/109
8/13/2019 Unintentional Insider Threats: Social Engineering
6/109
8/13/2019 Unintentional Insider Threats: Social Engineering
7/109
8/13/2019 Unintentional Insider Threats: Social Engineering
8/109
8/13/2019 Unintentional Insider Threats: Social Engineering
9/109
mailto:sean.mcafee@hq.dhs.gov8/13/2019 Unintentional Insider Threats: Social Engineering
10/109
8/13/2019 Unintentional Insider Threats: Social Engineering
11/109
8/13/2019 Unintentional Insider Threats: Social Engineering
12/109
8/13/2019 Unintentional Insider Threats: Social Engineering
13/109
http://www.sei.cmu.edu/library/abstracts/reports/13tn022.cfmhttp://www.algosec.com/resources/files/Specials/Survey%20files/8/13/2019 Unintentional Insider Threats: Social Engineering
14/109
8/13/2019 Unintentional Insider Threats: Social Engineering
15/109
8/13/2019 Unintentional Insider Threats: Social Engineering
16/109
8/13/2019 Unintentional Insider Threats: Social Engineering
17/109
8/13/2019 Unintentional Insider Threats: Social Engineering
18/109
8/13/2019 Unintentional Insider Threats: Social Engineering
19/109
8/13/2019 Unintentional Insider Threats: Social Engineering
20/109
8/13/2019 Unintentional Insider Threats: Social Engineering
21/109
8/13/2019 Unintentional Insider Threats: Social Engineering
22/109
8/13/2019 Unintentional Insider Threats: Social Engineering
23/109
8/13/2019 Unintentional Insider Threats: Social Engineering
24/109
8/13/2019 Unintentional Insider Threats: Social Engineering
25/109
8/13/2019 Unintentional Insider Threats: Social Engineering
26/109
8/13/2019 Unintentional Insider Threats: Social Engineering
27/109
8/13/2019 Unintentional Insider Threats: Social Engineering
28/109
8/13/2019 Unintentional Insider Threats: Social Engineering
29/109
8/13/2019 Unintentional Insider Threats: Social Engineering
30/109
8/13/2019 Unintentional Insider Threats: Social Engineering
31/109
8/13/2019 Unintentional Insider Threats: Social Engineering
32/109
8/13/2019 Unintentional Insider Threats: Social Engineering
33/109
8/13/2019 Unintentional Insider Threats: Social Engineering
34/109
8/13/2019 Unintentional Insider Threats: Social Engineering
35/109
8/13/2019 Unintentional Insider Threats: Social Engineering
36/109
8/13/2019 Unintentional Insider Threats: Social Engineering
37/109
8/13/2019 Unintentional Insider Threats: Social Engineering
38/109
8/13/2019 Unintentional Insider Threats: Social Engineering
39/109
8/13/2019 Unintentional Insider Threats: Social Engineering
40/109
8/13/2019 Unintentional Insider Threats: Social Engineering
41/109
8/13/2019 Unintentional Insider Threats: Social Engineering
42/109
8/13/2019 Unintentional Insider Threats: Social Engineering
43/109
8/13/2019 Unintentional Insider Threats: Social Engineering
44/109
8/13/2019 Unintentional Insider Threats: Social Engineering
45/109
8/13/2019 Unintentional Insider Threats: Social Engineering
46/109
8/13/2019 Unintentional Insider Threats: Social Engineering
47/109
8/13/2019 Unintentional Insider Threats: Social Engineering
48/109
8/13/2019 Unintentional Insider Threats: Social Engineering
49/109
8/13/2019 Unintentional Insider Threats: Social Engineering
50/109
8/13/2019 Unintentional Insider Threats: Social Engineering
51/109
8/13/2019 Unintentional Insider Threats: Social Engineering
52/109
8/13/2019 Unintentional Insider Threats: Social Engineering
53/109
8/13/2019 Unintentional Insider Threats: Social Engineering
54/109
8/13/2019 Unintentional Insider Threats: Social Engineering
55/109
8/13/2019 Unintentional Insider Threats: Social Engineering
56/109
8/13/2019 Unintentional Insider Threats: Social Engineering
57/109
8/13/2019 Unintentional Insider Threats: Social Engineering
58/109
8/13/2019 Unintentional Insider Threats: Social Engineering
59/109
8/13/2019 Unintentional Insider Threats: Social Engineering
60/109
8/13/2019 Unintentional Insider Threats: Social Engineering
61/109
8/13/2019 Unintentional Insider Threats: Social Engineering
62/109
8/13/2019 Unintentional Insider Threats: Social Engineering
63/109
8/13/2019 Unintentional Insider Threats: Social Engineering
64/109
8/13/2019 Unintentional Insider Threats: Social Engineering
65/109
8/13/2019 Unintentional Insider Threats: Social Engineering
66/109
8/13/2019 Unintentional Insider Threats: Social Engineering
67/109
8/13/2019 Unintentional Insider Threats: Social Engineering
68/109
8/13/2019 Unintentional Insider Threats: Social Engineering
69/109
8/13/2019 Unintentional Insider Threats: Social Engineering
70/109
8/13/2019 Unintentional Insider Threats: Social Engineering
71/109
8/13/2019 Unintentional Insider Threats: Social Engineering
72/109
8/13/2019 Unintentional Insider Threats: Social Engineering
73/109
8/13/2019 Unintentional Insider Threats: Social Engineering
74/109
8/13/2019 Unintentional Insider Threats: Social Engineering
75/109
8/13/2019 Unintentional Insider Threats: Social Engineering
76/109
8/13/2019 Unintentional Insider Threats: Social Engineering
77/109
8/13/2019 Unintentional Insider Threats: Social Engineering
78/109
8/13/2019 Unintentional Insider Threats: Social Engineering
79/109
8/13/2019 Unintentional Insider Threats: Social Engineering
80/109
8/13/2019 Unintentional Insider Threats: Social Engineering
81/109
8/13/2019 Unintentional Insider Threats: Social Engineering
82/109
8/13/2019 Unintentional Insider Threats: Social Engineering
83/109
8/13/2019 Unintentional Insider Threats: Social Engineering
84/109
8/13/2019 Unintentional Insider Threats: Social Engineering
85/109
8/13/2019 Unintentional Insider Threats: Social Engineering
86/109
8/13/2019 Unintentional Insider Threats: Social Engineering
87/109
8/13/2019 Unintentional Insider Threats: Social Engineering
88/109
8/13/2019 Unintentional Insider Threats: Social Engineering
89/109
8/13/2019 Unintentional Insider Threats: Social Engineering
90/109
8/13/2019 Unintentional Insider Threats: Social Engineering
91/109
8/13/2019 Unintentional Insider Threats: Social Engineering
92/109
8/13/2019 Unintentional Insider Threats: Social Engineering
93/109
8/13/2019 Unintentional Insider Threats: Social Engineering
94/109
8/13/2019 Unintentional Insider Threats: Social Engineering
95/109
8/13/2019 Unintentional Insider Threats: Social Engineering
96/109
8/13/2019 Unintentional Insider Threats: Social Engineering
97/109
8/13/2019 Unintentional Insider Threats: Social Engineering
98/109
8/13/2019 Unintentional Insider Threats: Social Engineering
99/109
8/13/2019 Unintentional Insider Threats: Social Engineering
100/109
http://resources.sei.cmu.edu/library/asset-view.cfm?assetID=58744http://www.rbijou.com/2013/03/15/examining-the-cyber-kill-chain/http://www.antiphishing.org/reports/apwg_report_DEC2005_FINAL.pdfhttp://dro.deakin.edu.au/view/DU:300490758/13/2019 Unintentional Insider Threats: Social Engineering
101/109
http://dl.acm.org/citation.cfm?id=1124861http://computer-forensics.sans.org/blog/2009/10/14/security-intelligence-attacking-CMU/SEI-2013-TN-024http://computer-forensics.sans.org/blog/2009/10/14/security-intelligence-attacking-CMU/SEI-2013-TN-024http://computer-forensics.sans.org/blog/2009/10/14/security-intelligence-attacking-CMU/SEI-2013-TN-0248/13/2019 Unintentional Insider Threats: Social Engineering
102/109
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.64.1926&rep=rep1&type=pdfhttp://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/http://healthypeople.gov/2020/LHI/substanceAbuse.aspxhttp://arxiv.org/abs/1301.7643http://www.securityfocus.com/infocus/15278/13/2019 Unintentional Insider Threats: Social Engineering
103/109
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5615076&url=http%3A%2F%2Fieeexplorhttp://www.who.int/occupational_health/publications/pwh3rev.pdfhttp://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1652125&url=http%3A%2F%2Fieeexplorhttp://www.sciencedirect.com/science/article/pii/S1742684704000898http://www.jstor.org/discover/10.2307/1914185?uid=3739960&uid=2&uid=4&uid=3739256&sidhttp://markus-jakobsson.com/papers/jakobsson-psci07.pdf8/13/2019 Unintentional Insider Threats: Social Engineering
104/109
http://www.nytimes.com/2005/12/04/business/yourmoney/http://resources.infosecinstitute.com/http://www.us-cert.gov/security-publications/technical-trends-phishing-attacks8/13/2019 Unintentional Insider Threats: Social Engineering
105/109
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5279574http://www.time.com/time/health/article/0,8599,1869106,00.html8/13/2019 Unintentional Insider Threats: Social Engineering
106/109
8/13/2019 Unintentional Insider Threats: Social Engineering
107/109
8/13/2019 Unintentional Insider Threats: Social Engineering
108/109
8/13/2019 Unintentional Insider Threats: Social Engineering
109/109