Analysis of the vulnerability of IT system users to a phishing attack

Szymon Grzebielec

szymon.grzebielec@live.com
Lublin University of Technology (Poland)

Abstract

This article presents an analysis of users' vulnerability to phishing attacks. The study was carried out using a self-prepared attack. A phishing attack was carried out on a group of 100 people. The subjects were divided into two groups of 50 people. The first group was attacked from a private, trusted account. The second group was attacked from a foreign email address. The attacked people were asked to complete the survey, its results and conclusions are presented in this article.


Keywords:

network security; network attacks; phishing

https://www.wirtualnemedia.pl/artykul/22-miliardy-urzadzen-podlaczonych-do-internetu [28.10.2019]
  Google Scholar

http://www.benchmark.pl/aktualnosci/ile-osob-ma-dostep-do-internetu-na-swiecie-juz-ponad-4-miliardy.html [28.10.2019]
  Google Scholar

http://edu.pjwstk.edu.pl/wyklady/bdk/scb/main06.html [28.10.2019]
  Google Scholar

https://devpark.pl/pl/najpopularniejsze-wedlug-owasp-rodzaje-atakow-sieciowych-i-jak-sie-przed-nimi-zabezpieczyc/ [28.10.2019]
  Google Scholar

https://www.cert.pl/ [28.10.2019]
  Google Scholar

https://www.firmex.com/thedealroom/spear-phishing-whos-getting-caught/ [28.10.2019]
  Google Scholar

https://www.secureworks.com/research/threat-group-4127-targets-google-accounts [28.10.2019]
  Google Scholar

https://www.theregister.co.uk/2008/04/16/whaling_expedition_continues/ [28.10.2019]
  Google Scholar

https://www.lifewire.com/what-is-whaling-2483605 [28.10.2019]
  Google Scholar

https://www.prnews.pl [28.10.2019]
  Google Scholar

https://retruster.com/blog/2019-phishing-and-email-fraud-statistics.html [28.10.2019]
  Google Scholar

https://www.securelist.pl/analysis/7483,spam_i_phishing_w_2018_r.html [28.10.2019]
  Google Scholar

https://www.webroot.com [28.10.2019]
  Google Scholar

Download


Published
2020-06-27

Cited by

Grzebielec, S. (2020). Analysis of the vulnerability of IT system users to a phishing attack. Journal of Computer Sciences Institute, 15, 164–167. https://doi.org/10.35784/jcsi.2049

Authors

Szymon Grzebielec 
szymon.grzebielec@live.com
Lublin University of Technology Poland

Statistics

Abstract views: 401
PDF downloads: 323