All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Identification of Unintentional Perpetrator Attack Vectors using Simulation Game: A Case Study

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F21%3A00121985" target="_blank" >RIV/00216224:14330/21:00121985 - isvavai.cz</a>

  • Result on the web

    <a href="https://ieeexplore.ieee.org/abstract/document/9555700" target="_blank" >https://ieeexplore.ieee.org/abstract/document/9555700</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.15439/2021F85" target="_blank" >10.15439/2021F85</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Identification of Unintentional Perpetrator Attack Vectors using Simulation Game: A Case Study

  • Original language description

    In our digital era, insider attacks are among the serious underresearched areas of the cybersecurity landscape. A significant type of insider attack is facilitated by employees without malicious intent. They are called unintentional perpetrators. We proposed mitigating these threats using a simulation-game platform to detect the potential attack vectors. This paper introduces and implements a scenario that demonstrates the usability of this approach in a case study. This work also helps to understand players' behavior when they are not told upfront that they will be a target of social engineering attacks. Furthermore, we provide relevant acquired observations for future research.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

    <a href="/en/project/EF16_019%2F0000822" target="_blank" >EF16_019/0000822: CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2021

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of the 16th Conference on Computer Science and Intelligence Systems

  • ISBN

    9788395918384

  • ISSN

  • e-ISSN

  • Number of pages

    8

  • Pages from-to

    349-356

  • Publisher name

    IEEE

  • Place of publication

    New York

  • Event location

    Sofia, Bulgaria

  • Event date

    Jan 1, 2021

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000904349400045