According to the yearly publication of Dutch National Cyber Security Center of the currentc yber security situation of the country (CSBN 2017) a cyber-attack originated in 91% of the investigated cases from some form of phishing. Because a very high percentage of cybersecurity incidents start with some kind of phishing, the action and reaction of employees on phishing attacks could be used as a measurement method to quantify the level of cybersecurity awareness of an organization. Governmental organizations invest millions in the protection of their internal systems and infrastructure, but only train their employees in a low-cost, short duration, Cybersecurity Awareness course. There are huge investments in defensive technologies, but little investments in human awareness. Quantifying the level of awareness of employees can be used to measure changes in the level of CSA of that particular organization.

 

This thesis researches the available CSA-level measurement methods and proposes a methodology based on quantification of the factual measurement level of cybersecurity awareness of organizations by using gamification of phishing.

 

Key words: Phishing, Awareness, Gamification, Psychological Influence Factors, Cybersecurity

 

READ PDF>

 

 

  • A methodology for quantifying the level of cybersecurity...
    Master CS/Robert de Vries
    >
  • A methodology for qu...
    Master CS/Robert de Vries
    >
  • A methodology for quantifying the level of cybersecurity...
    Master CS/Robert de Vries
    >
  • A security architecture for software defined wide area n...
    Master CS/Mark Dirksen
    >
  • A security architect...
    Master CS/Mark Dirksen
    >
  • A security architecture for software defined wide area n...
    Master CS/Mark Dirksen
    >
  • Are the Dutch government controls for the protection of...
    Master CS/Erik van Garderen
    >
  • Are the Dutch govern...
    Master CS/Erik van Garderen
    >
  • Are the Dutch government controls for the protection of...
    Master CS/Erik van Garderen
    >
  • Can a Robot Do My Job? A Study on the Potential of Artif...
    Master CS/Esther van Luit
    >
  • Can a Robot Do My Jo...
    Master CS/Esther van Luit
    >
  • Can a Robot Do My Job? A Study on the Potential of Artif...
    Master CS/Esther van Luit
    >
  • Exploring the Dutch Digital Infrastructure. Data Issues,...
    Master CS/Alex Claver
    >
  • Exploring the Dutch...
    Master CS/Alex Claver
    >
  • Exploring the Dutch Digital Infrastructure. Data Issues,...
    Master CS/Alex Claver
    >
  • Improving cyber safety awareness education at Dutch elem...
    Master CS/Arjan Spiering
    >
  • Improving cyber safe...
    Master CS/Arjan Spiering
    >
  • Improving cyber safety awareness education at Dutch elem...
    Master CS/Arjan Spiering
    >
  • Policy instruments and the adoption of DNSSEC; A case st...
    Master CS/Rene Bakker
    >
  • Policy instruments a...
    Master CS/Rene Bakker
    >
  • Policy instruments and the adoption of DNSSEC; A case st...
    Master CS/Rene Bakker
    >
  • Processing Electromagnetic Parameters from a Secret Data...
    Master CS/Susan Varenbrink
    >
  • Processing Electroma...
    Master CS/Susan Varenbrink
    >
  • Processing Electromagnetic Parameters from a Secret Data...
    Master CS/Susan Varenbrink
    >
  • Reports, Rewards, and Recriminations. A critical look at...
    Master CS/Kees Wassenaar
    >
  • Reports, Rewards, an...
    Master CS/Kees Wassenaar
    >
  • Reports, Rewards, and Recriminations. A critical look at...
    Master CS/Kees Wassenaar
    >
  • Risk assessment for I2P with an enhanced outproxy design
    Master CS/Dolf Smits
    >
  • Risk assessment for...
    Master CS/Dolf Smits
    >
  • Risk assessment for I2P with an enhanced outproxy design
    Master CS/Dolf Smits
    >
  • The Internet of Things: a privacy label for IoT products...
    Master CS/Rob van Diermen
    >
  • The Internet of Thin...
    Master CS/Rob van Diermen
    >
  • The Internet of Things: a privacy label for IoT products...
    Master CS/Rob van Diermen
    >
  • The Unified Kill Chain
    Master CS/Paul Pols
    >
  • The Unified Kill Cha...
    Master CS/Paul Pols
    >
  • The Unified Kill Chain
    Master CS/Paul Pols
    >

This website uses cookies to ensure you get the best experience on our website. By continuing to browse the site, you are agreeing to our use of cookies.. More info

 

I AGREE