A Serious Game for Eliciting Social Engineering Security Requirements

Kristian Beckers, Sebastian Pape
2016 2016 IEEE 24th International Requirements Engineering Conference (RE)  
Social engineering is the acquisition of information about computer systems by methods that deeply include nontechnical means. While technical security of most critical systems is high, the systems remain vulnerable to attacks from social engineers. Social engineering is a technique that: (i) does not require any (advanced) technical tools, (ii) can be used by anyone, (iii) is cheap. Traditional security requirements elicitation approaches often focus on vulnerabilities in network or software
more » ... stems. Few approaches even consider the exploitation of humans via social engineering and none of them elicits personal behaviours of individual employees. While the amount of social engineering attacks and the damage they cause rise every year, the security awareness of these attacks and their consideration during requirements elicitation remains negligible. We propose to use a card game to elicit these requirements, which all employees of a company can play to understand the threat and document security requirements. The game considers the individual context of a company and presents underlying principles of human behaviour that social engineers exploit, as well as concrete attack patterns. We evaluated our approach with several groups of researchers, IT administrators, and professionals from industry.
doi:10.1109/re.2016.39 dblp:conf/re/Beckers016 fatcat:wj5velrbozg6hpssaj3c4ia27i