In my master's thesis I am checking the effectiveness of a phishing campaign in one of the
Slovenian companies. First of all, it is necessary to define what phishing is, what the process of
a phishing attack is and what the consequences of a successful phishing attack are. In my
master's thesis, I also list some similar forms of phishing attacks, which can potentially be even
more effective and also have wider consequences. I also mention some defense mechanisms,
which through use and implementation are used to, some extent, protect individuals from
phishing attacks. There are several defense mechanisms, but the implementation and use of just
one is often not enough to effectively defend against phishing attacks, therefore a combination
of several defense mechanisms is recommended for greater security against phishing attacks.
Before carrying out a simulated phishing attack, I discover the reasons for the success of
phishing campaigns and why phishing campaigns are so successful. The simulation of the
phishing attack was performed on a sample of about a hundred employees in an unnamed
Slovenian company. I divided the company’s employees by departments. As a master’s thesis
hypothesis, I set the goal that a simulation of a phishing attack would be at least 10% successful,
and I also predicted that the sales department would be most unsuccessful in recognizing a
phishing attack.
|