Senior Citizens and Cybersecurity Awareness

Similar documents
WHAT S DRIVING CITIZENS CYBER INSECURITY?

Caribbean Cyber Security: Not Only Government s Responsibility

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Personal Cybersecurity

The Global Cybercrime Industry

Legal Foundation and Enforcement: Promoting Cybersecurity

Defending Our Digital Density.

CYBERSECURITY SAVE YOUR BOTTOM LINE IBC Annual Convention Anne Benigsen, Bankers Bank of the West

Security in India: Enabling a New Connected Era

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

ITU Regional Cybersecurity Forum for Asia-Pacific

ELECTRONIC BANKING & ONLINE AUTHENTICATION

ISACA West Florida Chapter - Cybersecurity Event

Panda Security 2010 Page 1

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

2 nd ARF Seminar on Cyber Terrorism PAKISTAN S PERSPECTIVE AND EXPERIENCE WITH REFERENCE TO CERT IN COMBATING CYBER TERRORISM

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Promoting Global Cybersecurity

Security & Phishing

Entertaining & Effective Security Awareness Training

CYBER SOLUTIONS & THREAT INTELLIGENCE

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Service Provider View of Cyber Security. July 2017

Understanding the Changing Cybersecurity Problem

June 2 nd, 2016 Security Awareness

Must Have Items for Your Cybersecurity or IT Budget in 2018

Evolution of Spear Phishing. White Paper

Professional Training Course - Cybercrime Investigation Body of Knowledge -

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

Introduction to Information Security Dr. Rick Jerz

The GenCyber Program. By Chris Ralph

JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN

FSOR. Cyber security in the financial sector VISION 2020 FINANCIAL SECTOR FORUM FOR OPERATIONAL RESILIENCE

VIETNAM CYBER-SAVVINESS REPORT 2015 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN VIETNAM

Contents The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

716 West Ave Austin, TX USA

Advanced IT Risk, Security management and Cybercrime Prevention

TRUSTED MOBILITY INDEX

Troubleshooting and Cyber Protection Josh Wheeler

Cybersecurity Fundamentals Paul Jones CIO Clerk & Comptroller Palm Beach County CISSP, ITIL Expert, Security+, Project+

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Building a Threat Intelligence Program

Unit 3 Cyber security

REPORT. proofpoint.com


Cyber-Threats and Countermeasures in Financial Sector

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Kaspersky Security Awareness

mhealth SECURITY: STATS AND SOLUTIONS

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Tackling Cybersecurity with Data Analytics. Identifying and combatting cyber fraud

Forensics and Active Protection

Cybersecurity, safety and resilience - Airline perspective

OPSEC and defense agains social engineering for devels, execs, and sart-ups

Chapter 6 Network and Internet Security and Privacy

Cybersecurity Auditing in an Unsecure World

A Framework for Managing Crime and Fraud

Rohana Palliyaguru Director -Operations Sri Lanka CERT CC APCERT AGM and Conference, 24 th October 2018 Shanghai, China MINISTRY OF TELECOMMUNICATION

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Business Crime Strategy

BUSINESS CONTINUITY MANAGEMENT

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Cyber Crime Update. Mark Brett Programme Director February 2016

Cyber Security Roadmap

The UK s National Cyber Security Strategy

Cyber Fraud What can you do about it?

June 5, 2018 Independence, Ohio

Thailand Initiatives and Challenges in Cyber Terrorism

Integrated Access Management Solutions. Access Televentures

BRING SPEAR PHISHING PROTECTION TO THE MASSES

Certified Cyber Security Analyst VS-1160

Cyber Security in Smart Commercial Buildings 2017 to 2021

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT

Commonwealth Cyber Declaration

The Impact of Cybersecurity, Data Privacy and Social Media

2014 TRANSIT CEOs SEMINAR. Cybersecurity What Every CEO Should Know to Help Secure the System

UNB S CYBERSECURITY PROGRAM

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

CE Advanced Network Security Phishing I

How To Remove Personal Antivirus Security Pro Virus

Cyber Incident Response: Step 1

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Why you MUST protect your customer data

OA Cyber Security Plan FY 2018 (Abridged)

10 Quick Tips to Mobile Security

Forging a Stronger Approach for the Cybersecurity Challenge. Session 34, February 12, 2019 Tom Stafford, VP & CIO, Halifax Health

Opening Doors to Cyber and Homeland Security Careers

Transcription:

Senior Citizens and Cybersecurity Awareness Presenters/Co-authors: Carlene Blackwood-Brown, M.Sc. Yair Levy, Ph.D. Steven Terrell, Ph.D. College of Engineering and Computing Nova Southeastern University

2 Overview Introduction Research Problem Attack Vector Users Actions Via Non-Secured Wi-Fi Networks Phishing Attacks Cybersecurity Awareness Research Significance Senior Citizens as Targets Research Questions Expected Impact of Research

Introduction Billions of dollars in losses accrued to Internet users due to cyber-attacks that exploit human vulnerabilities (Abawajy, 2014). Senior citizens are one of the most vulnerable groups of Internet users who are prone to cyber-attacks (Claar & Johnson, 2012; Grimes et al., 2010). Reason: Limited awareness of cybersecurity countermeasures 3

Cyber Threats and Attacks Captured between 4/10/2015 to 4/14/2015 for 24 sec

Cyber Crime Impact 5 Source: Norton cybercrime report

Cyber Crime Impact http://mobileadvertisingwatch.com/wp-content/uploads/2015/09/gartner-the-internet-of-things-will-change-cybersecurity-forever.jpg

Research Problem The increase in the success of cyber-attack vectors due to limited awareness of cybersecurity countermeasures among Internet users Effects of Problem: Significant financial losses for governments, organizations, and the Internet users themselves (Abbasi et al., 2010; D Arcy et al., 2009; Purkait et al., 2014). 7

Attack Vector Path through which a cyber-criminal can gain access to a network server or a computer in order to deliver a malicious effect or obtain information for malicious purposes (Lemoudden et al., 2013). Non-secured wireless (Wi-Fi) networks, and phishing attacks are the most common ways for cyber penetrations to happen (Futcher, 2015; Noor & Hassan, 2013). Prevention of personal identity information (PII) theft via access to nonsecured networks, and preventing PII theft via email phishing identified among the top nine cybersecurity skills needed by non-it professionals to counter cyber-attacks (Carlton & Levy, 2015). 8

Users Actions Via Non-Secured Wi-Fi Networks Non-secured Wi-Fi network settings: homes, libraries, malls, coffee shops, senior centers, etc. (Grimes et al., 2010) In 2013, a survey of 13,022 adults revealed the following about users actions on non-secured Wi-Fi networks (Symantec, Norton Report, 2013). Amount of Users Actions 56% Accessed social network account 54% Accessed personal e-mail 29% Accessed their bank account 29% Shopped online 9 Three out of 10 Did not always log off after having used a public Wi-Fi connection 39% Did not take any special steps to protect themselves when using public Wi-Fi networks

Phishing Attacks Online scams that use unsolicited messages to trick victims into revealing their financial and/or personal identity information (PII) to commit or facilitate other crimes such as fraud, identity theft and theft of sensitive information (Choo, 2011). Deception occurs because the messages seem like they are from legitimate organizations, especially banking and finance services 10

2014 Phishing Attacks Statistics Statistics (Anti-Phishing Working Group, 2015). Represents a 20% increase over the two quarters of the same year 11

12 Cybersecurity Awareness Involves informing Internet users of cybersecurity issues and threats, as well as enhancing their understanding of cyber threats so they can be fully committed to embracing security when they use the Internet (Rahim et al., 2015) Cybersecurity awareness countermeasures training focus on making Internet users more aware so that they can identify cyber-attacks as well as mitigate the effects of the cyber-attacks when they use the Internet (Rahim et al., 2015).

Research Significance To make senior citizens aware of the potential dangers of phishing attacks and using unsecured Wi-Fi networks, as well as how to mitigate the impacts of cyber-attacks Senior citizens make up one of the fastest growing groups of Internet users (Iyer & Eastman, 2006). Internet Usage Statistics by Age (Perrin & Duggan, 2015). Since 2012, more than half of all senior citizens report using the Internet Senior citizens have the greatest rate of change since 2000 among all age groups surveyed. Cybersecurity awareness is essential for senior citizens as a countermeasure strategy to combat cyber-attacks (Choo, 2011). 13

Research Significance (Cont.) 14

Senior Citizens as Targets One in five American senior citizen is a victim of online financial fraud, costing more than $2.6 billion per year (Willis, 2015). Senior citizens who are identity theft victims suffer devastating effects (Jones, 2001): Loss of all their life savings Feelings of shame for being victims Decreased self-confidence Exacerbated illnesses to include premature death 15

Main Research Question Are there significant mean differences in the levels of cybersecurity awareness, self-confidence, and perceived risk of identity theft, as well as intrinsic motivation and extrinsic motivation to pursue additional cybersecurity awareness training between a group of senior citizens who will receive cybersecurity awareness training and another group who will not receive cybersecurity awareness training over a period of six weeks? 16

Specific Research Questions 17 Is there a significant mean difference in the levels of cybersecurity awareness, selfconfidence, and perceived risk of identity theft, as well as intrinsic motivation and extrinsic motivation to pursue additional cybersecurity awareness training of senior citizens who will receive cybersecurity awareness training (Group A) before (t1) and immediately after (t3) the cybersecurity awareness training? Is there a significant mean difference in the levels of cybersecurity awareness, selfconfidence, and perceived risk of identity theft, as well as intrinsic motivation and extrinsic motivation to pursue additional cybersecurity awareness training of senior citizens who will not receive cybersecurity awareness training (Group B) before (t1) and immediately after (t3) the other group receives the cybersecurity awareness training? Is there a significant mean difference in the levels of cybersecurity awareness, selfconfidence, and perceived risk of identity theft, as well as intrinsic motivation and extrinsic motivation to pursue additional cybersecurity awareness training between a group of senior citizens who will receive cybersecurity awareness training and another group who will not, prior to the training (Group A vs. B @ t1)?

Specific Research Questions (Cont.) 18 Are there significant mean differences in the levels of cybersecurity awareness, selfconfidence, and perceived risk of identity theft, as well as intrinsic motivation and extrinsic motivation to pursue additional cybersecurity awareness training of senior citizens who will receive cybersecurity awareness training (Group A) over a period of six weeks following the training (t3, t4, t5, & t6)? Are there significant mean differences in the levels of cybersecurity awareness, selfconfidence, and perceived risk of identity theft, as well as intrinsic motivation and extrinsic motivation to pursue additional cybersecurity awareness training of senior citizens who will not receive cybersecurity awareness training (Group B) over a period of six weeks following the other group receiving the training (t3, t4, t5, & t6)? Are there significant mean differences in the levels of cybersecurity awareness, selfconfidence, and perceived risk of identity theft, as well as intrinsic motivation and extrinsic motivation to pursue additional cybersecurity awareness training between a group of senior citizens who will receive cybersecurity awareness training and another group who will not, over a period of six weeks following the training (Group A vs. B @ t3, t4, t5, & t6)?

Proposed Measurements and Times for Group A (group that will receive the training) and Group B (group that will not receive the training) 19

Expected Impacts of Research To reduce the success of cyber-attacks vectors that result from limited awareness of cybersecurity countermeasures among senior citizens To increase the awareness levels amongst senior citizens regarding issues of cybersecurity To motivate senior citizens to seek training in cybersecurity countermeasures To establish how increased awareness of cybersecurity countermeasures can mitigate the impacts of cyber-attacks amongst senior citizens To show how increasing cybersecurity awareness among senior ctizens can positively contribute to aging 20

Questions? 21

Thank You 22

References Abawajy, J. (2014). User preference of cybersecurity awareness delivery methods. Behavior & Information Technology, 33(3), 236-247. Abbasi, A., Zhang, Z., Zimbra, D., Chen, H., & Nunamaker, J. F. (2010). Detecting fake websites: The contribution of statistical learning theory. MIS Quarterly, 34(3), 435-461. Anti-Phishing Working Group (2015). Phishing activity trends report, 4th quarter 2014. Retrieved from http://docs.apwg.org/reports/apwg_trends_report_q4_2014.pdf Carlton, M., & Levy, Y. (2015). Expert assessment of the top platform independent cybersecurity skills for non-it professionals. Proceedings of the 2015 IEEE SoutheastCon, Ft. Lauderdale, Florida, pp.1-6. Choo, K-K., R. (2011). The cyber threat landscape: Challenges and future research directions, Computers & Security, 30(8), 719-731. Claar, C. L., & Johnson, J. (2012). Analyzing home PC security adoption behavior. Journal of Computer Information Systems, 52(4), 20-29. D Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79-98. Futcher, A. L. L. (2015). A framework to assist email users in the identification of phishing attacks. Information & Computer Security, 23(4), 1-14. Grimes, G. A., Hough, M. G., Mazur, E., & Signorella, M. L. (2010). Older adults' knowledge of Internet hazards. Educational Gerontology, 36(3), 173-192. 23

References Iyer, R., & Eastman, J. K. (2006). The elderly and their attitudes toward the Internet: The impact on Internet use, purchase, and comparison shopping. Journal of Marketing Theory and Practice, 14(1), 57-67. Jones, T. L. (2001). Protecting the elderly. Law & Order, 49(4), 102-106. Lemoudden, M., Bouazza, N. B., El Ouahidi, B., & Bourget, D. (2013). A survey of cloud computing security overview of attack vectors and defense mechanisms. Journal of Theoretical & Applied Information Technology, 54(2), 325-330. Perrin, P., & Duggan, M. (2015). Americans Internet Access: 2000-2015. Pew Research Center. Retrieved from http://www.pewinternet.org/2015/06/26/americans-internet-access-2000-2015/ Purkait, S., Kumar De, S., & Suar, D. (2014). An empirical investigation of the factors that influence Internet user s ability to correctly identify a phishing website. Information Management & Computer Security, 22(3), 194-234. Rahim, N. H. A., Hamid, S., Kiah, L. M., Shamshirband, S., & Furnell, S. (2015). A systematic review of approaches to assessing cybersecurity awareness. Kybernetes, 44(4), 606-622. Shillair, R., Cotten, S. R., Tsai, H-Y. S., Alhabash, S. LaRose, R., & Rifon, N. J. (2015). Online safety begins with you and me: Convincing Internet users to protect themselves. Computers in Human Behavior, 48, 199-207. Symantec Corporation. (2013). 2013 Norton Report. Retrieved from http://www.symantec.com/en/ca/about/news/resources/press_kits/detail.jsp?pkid=norton-report-2013 Willis, D. P. (2015, June 15). 5 steps for seniors to avoid financial fraud. McClatchy - Tribune Business News Retrieved from http://www.app.com/story/money/business/consumer/2015/06/15/senior-financial-fraud/71264182/ 24