Abstract
This study investigates public awareness of phishing practices in Hungary, emphasizing the evolving landscape of cybercrime and the strategic importance of information in contemporary society. The research examines the methods and factors contributing to successful phishing schemes, employing statistical data to enhance understanding and defense mechanisms against such attacks. By delving into the techniques and psychological triggers used to deceive victims, the study aims to provide a comprehensive view of phishing threats. The research explores whether demographic differences, education, and internet use influence susceptibility to phishing attacks. Two primary assumptions are tested: that demographic factors affect knowledge and attitudes about phishing, and that individuals frequently fail to recognize phishing attempts. Highlighting the importance of process-based protection over purely technical tools, the study stresses that user decisions and knowledge are crucial in defending against phishing. Process-based security, including blocking malicious sites and notifying users, is essential, with a significant responsibility resting on service providers, state, and national security agencies. However, the user's role is critical as the weakest link in the security chain. Technological advancements in defense methods are discussed, noting that as these methods become more effective, attackers shift their focus from systems to the personnel operating them. This shift underscores the increasing significance of the human factor in internet security. Phishing incidents often go unreported as companies prefer to absorb losses rather than reveal vulnerabilities, fearing significant customer loss. The study emphasizes the value of information, both as a target for criminals and as crucial knowledge for prevention. Protecting data and disseminating knowledge are essential tasks in combating IT crime, underscoring the need for ongoing research and awareness.
Publisher
Ferenc Rakoczi II Transcarpathian Hungarian College of Higher Education
Reference33 articles.
1. Anti-Phishing Working Group (2009-2018) Phishing Activity Trends. Available from: https://www.antiphishing.org/resources/apwg-reports/ (last accessed: February 2, 2024)
2. Arachchilage and Love, S. (2013). A game design framework to avoid phishing attacks. Computers in Human Behavior 29 (3), 706-714. DOI : https://doi.org/10.1016/j.chb.2012.12.018
3. Borbíró, A. (2016). Kriminológiaelmélet: bűnözésmagyarázatok (Theory of Criminology. Crime Explains – in Hungarian) In: Borbíró, A., Gönczöl, K., Kerezsi, K., Lévay, M. (szerk.). Kriminológia. Budapest: Wolters-Kluwer, 29-313. o.
4. CERT Insider Threat Team (2013). Unintentional Insider Threats: A Foundational Study. Available from: http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=58744 (last accessed: March 3, 2024)
5. Cohen, LE and Felson, M. (1979). Social Change and Crime Rate Trends : The Routine Activity Approach. American Sociological Review, 44 (4), 588-608. DOI : 10.2307/2094589