{"id":9316,"date":"2023-04-05T09:14:02","date_gmt":"2023-04-05T14:14:02","guid":{"rendered":"https:\/\/www.wisconsin.edu\/all-in-wisconsin-new\/?post_type=campus_story&#038;p=9316"},"modified":"2023-04-05T09:14:02","modified_gmt":"2023-04-05T14:14:02","slug":"uw-platteville-student-presents-research-on-shifting-cybersecurity-social-engineering","status":"publish","type":"campus_story","link":"https:\/\/www.wisconsin.edu\/all-in-wisconsin\/story\/uw-platteville-student-presents-research-on-shifting-cybersecurity-social-engineering\/","title":{"rendered":"UW-Platteville student presents research on shifting cybersecurity &#8216;social engineering&#8217;"},"content":{"rendered":"<figure id=\"attachment_9318\" aria-describedby=\"caption-attachment-9318\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.wisconsin.edu\/all-in-wisconsin-new\/wp-content\/uploads\/sites\/378\/2023\/03\/PLT_RITR-research_Justin_Cybersecurity-Research.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-9318\" src=\"https:\/\/www.wisconsin.edu\/all-in-wisconsin-new\/wp-content\/uploads\/sites\/378\/2023\/03\/PLT_RITR-research_Justin_Cybersecurity-Research-1024x576.jpg\" alt=\"Photo of UW-Platteville Richland student Justin Yeung has designed research to test the effectiveness of different social engineering techniques hackers are using.\" width=\"1024\" height=\"576\" \/><\/a><figcaption id=\"caption-attachment-9318\" class=\"wp-caption-text\">UW-Platteville Richland student Justin Yeung has designed research to test the effectiveness of different social engineering techniques hackers are using.<\/figcaption><\/figure>\n<p>Maintaining the edge on hackers requires regularly shifting to new ideas and innovative cybersecurity techniques.\u00a0Misled or deceived end-users have long been the easiest hack to make to get data flowing down the wrong path, as the growing stream of ever-evolving deceptive emails (i.e. \u201cphishing\u201d) asking users to click on unknown links or fill out unexpected online forms sent from senior management demonstrates. These techniques, known broadly in cybersecurity as \u201csocial engineering,\u201d exploit human errors to\u00a0attack individual users and integrated systems.<\/p>\n<p>UW-Platteville Richland student Justin Yeung has designed research to test the effectiveness of different social engineering techniques hackers are using to offset the growing awareness of phishing techniques among end-users. He will present his research plans and early findings\u00a0to legislators, state leaders and peers from across the UW System\u00a0at the 19th\u00a0annual\u00a0Research in the Rotunda,\u00a0held on Wednesday, March 8 in the state Capitol.<\/p>\n<p>Successful phishing depends on users clicking on links uncritically, thereby inserting malicious code into other systems and processes a user has access to.\u00a0But, as users grow more sophisticated, so must hackers.\u00a0Yeung thought of another end-user access point that could be exploited \u2013 the \u201cterms and conditions\u201d dialogue box that most users rarely ever read.<\/p>\n<p>\u201cThat window is a place it\u2019s easy to fool people,\u201d said Yeung, whose research created simulations to see if users paid more or less attention to various kinds of pop-up windows or other deceptive techniques incorporated into \u201caccepting\u201d a software installation or update.<\/p>\n<p>Yeung is also examining other ways computers are deceived into opening communications with each other, most commonly through a \u201creplay attack,\u201d where a hacker intercepts a legitimate packet of authorizing code and then either re-transmits or re-creates it at another time, granting valid but unauthorized communications between systems.<\/p>\n<p>Understanding more about what techniques are more effective at fooling users and ultimately other computers can help develop countermeasures, according to Yeung\u2019s advisor on the research, Dr. Bassam Zahran, assistant professor in the UW-Platteville Department of Computer Science and Software Engineering. Zahran sees real promise and practical implications for Yeung\u2019s research.<\/p>\n<p>\u201cAs information technology and operational technology, like industrial control systems, are converging, previously isolated systems are more vulnerable to these kinds of social engineering attacks,\u201d said Zahran.<\/p>\n<hr \/>\n<p>Written by John Christensen<\/p>\n<p>Link to original story: <a href=\"https:\/\/www.uwplatt.edu\/news\/student-presents-research-shifting-cybersecurity-social-engineering\">https:\/\/www.uwplatt.edu\/news\/student-presents-research-shifting-cybersecurity-social-engineering<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Maintaining the edge on hackers requires regularly shifting to new ideas and innovative cybersecurity techniques.\u00a0Misled or deceived end-users have long been the easiest hack to make to get data flowing down the wrong path, as the growing stream of ever-evolving deceptive emails (i.e. \u201cphishing\u201d) asking users to click on unknown links or fill out unexpected [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":9318,"comment_status":"closed","ping_status":"closed","template":"","institution":[93],"story_category":[],"class_list":["post-9316","campus_story","type-campus_story","status-publish","has-post-thumbnail","hentry","institution-uw-platteville"],"_links":{"self":[{"href":"https:\/\/www.wisconsin.edu\/all-in-wisconsin\/wp-json\/wp\/v2\/campus_story\/9316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wisconsin.edu\/all-in-wisconsin\/wp-json\/wp\/v2\/campus_story"}],"about":[{"href":"https:\/\/www.wisconsin.edu\/all-in-wisconsin\/wp-json\/wp\/v2\/types\/campus_story"}],"author":[{"embeddable":true,"href":"https:\/\/www.wisconsin.edu\/all-in-wisconsin\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wisconsin.edu\/all-in-wisconsin\/wp-json\/wp\/v2\/comments?post=9316"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wisconsin.edu\/all-in-wisconsin\/wp-json\/wp\/v2\/media\/9318"}],"wp:attachment":[{"href":"https:\/\/www.wisconsin.edu\/all-in-wisconsin\/wp-json\/wp\/v2\/media?parent=9316"}],"wp:term":[{"taxonomy":"institution","embeddable":true,"href":"https:\/\/www.wisconsin.edu\/all-in-wisconsin\/wp-json\/wp\/v2\/institution?post=9316"},{"taxonomy":"story_category","embeddable":true,"href":"https:\/\/www.wisconsin.edu\/all-in-wisconsin\/wp-json\/wp\/v2\/story_category?post=9316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}