IJCATR Volume 11 Issue 6

A Survey of Awareness of Social Engineering Attacks to Information Security Management Systems: The Case of Kibabii University Kenya

Samwel Mungai Mbuguah, Tobias Okumu Otibine
10.7753/IJCATR1106.1003
keywords : Social engineering, attack, wetware, human traits. Information security management system

PDF
Computer based systems are socio-technical systems in nature. The security of the system depends both on technical aspect and also social aspect. The social aspect refers to people in contact with system commonly referred to as wetware. To attack the system you may consider to target the technical or wetware. Social engineering is based on exploiting human traits that make human susceptible to these attacks. The aim of this paper was establish how aware the staff of Kibabii University were of these attributes and how these attributes could be used by social engineers to penetrate the Information Security Management systems at the institution. A survey research was adopted with a questionnaire being developed using Google application, and was administered online to all staff members of Kibabii University. A descriptive analysis was carried out on feedback. The finding was that to a large extent the sampled staff are aware of these traits but there is need for awareness training to enhance the information security management system of Kibabii University
@artical{s1162022ijcatr11061003,
Title = "A Survey of Awareness of Social Engineering Attacks to Information Security Management Systems: The Case of Kibabii University Kenya",
Journal ="International Journal of Computer Applications Technology and Research(IJCATR)",
Volume = "11",
Issue ="6",
Pages ="187 - 192",
Year = "2022",
Authors ="Samwel Mungai Mbuguah, Tobias Okumu Otibine"}
  • There seven human traits that makes easier for social engineers to attack information security management system.
  • The paper infers that the security of system can be compromised either via technical or human being.
  • The paper infers that the wetware is weakest link in security of a system.
  • The paper infers that is need for continuous training of staff members to mitigate against social engineering attacks.