Poster 3 Extra3
Poster 3 Extra3
amount of publicly
available information
about organization or
insider
O
credibility of fictitious
scenario by outsider (eg,
reverse SE, pretexting)
B3
Reduction of
Sensitive
Externally
Available
Information
credibility of outsider
impersonation of
authorized entity
insider's
cognitive
workload
insider desire to
believe outsider
scenario
S
S
Confirmatory Bias
to Gain Access to
Fraudulent
R2 Content
S
insider's risk
awareness
S
recency and quality
of cyber security
training
S
insider trust in
outsider authenticity
insider desire to
be helpful
S
S
insider falling for
phishing operation
recognition of
exploitation by S
organization
Deepening Access
Privilege through Spear
Phishing
Insider Training to
Reduce Social
Engineering
B1
Gaining Access
Privilege through
Phishing
B2
R1
scenario
sense of
urgency
outsider
knowledge of
what specific
insider wants
insider desire to
access information
Confirmatory Bias to be
Helpful to Fraudulent
Outsider
R3
outsider gaining
access to information
to escalate privilege
O
S
exploitation of access
privilege by outsider to
cause harm
outsider access
privilege
Figure 23: Causal Loop Diagram of Avenues for Social Engineering Mitigation
CMU/SEI-2013-TN-024 | 58