Phishing

file

Visible to the public Spearphishing Defense Through Improved Usability

The information environment consists of three interrelated dimensions which are the physical, the informational and the cognitive. The most important of these is the cognitive dimension which encompasses the minds of people who interact with information and make decisions using information. Employing cyberspace operations, attackers use spearphishing to engage in espionage, sabotage and other intelligence-related activities. We discuss the use of an enhanced user interface as a means of counterintelligence to disrupt spearphishing attacks.

page

Visible to the public 2015 Symposium and Bootcamp on the Science of Security (HotSoS) - Poster Presentations

2015 Symposium and Bootcamp on the Science of Security (HotSoS) - Poster Presentations

An Architecture Style for Android Security
Bradley Schmerl, Jeffrey Gennari and David Garlan

An Online Community to Advance Cybersecurity Science
Don Goff

Building a Security Practices Evaluation Framework
Patrick Morrison and Laurie Williams