Categorizing human phishing difficulty: a Phish Scale

Abstract As organizations continue to invest in phishing awareness training programs, many chief information security officers (CISOs) are concerned when their training exercise click rates are high or variable, as they must justify training budgets to organization officials who question the efficac...

Full description

Saved in:
Bibliographic Details
Published inJournal of cybersecurity (Oxford) Vol. 6; no. 1
Main Authors Steves, Michelle, Greene, Kristen, Theofanos, Mary
Format Journal Article
LanguageEnglish
Published Oxford University Press 2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Abstract As organizations continue to invest in phishing awareness training programs, many chief information security officers (CISOs) are concerned when their training exercise click rates are high or variable, as they must justify training budgets to organization officials who question the efficacy of awareness training when click rates are not declining. We argue that click rates should be expected to vary based on the difficulty of the phishing email for a target audience. Past research has shown that when the premise of a phishing email aligns with a user’s work context, it is much more challenging for users to detect a phish. Given this, we propose a Phish Scale, so CISOs and phishing training implementers can easily rate the difficulty of their phishing exercises and help explain associated click rates. We base our scale on past research in phishing cues and user context, and apply the scale to previously published and new data from enterprise-based phishing exercises. The Phish Scale performed well with the current phishing dataset, but future work is needed to validate it with a larger variety of phishing emails. The Phish Scale shows great promise as a tool to help frame data sharing on phishing exercise click rates across sectors.
ISSN:2057-2085
2057-2093
DOI:10.1093/cybsec/tyaa009