A MOBILE MONEY SOCIAL ENGINEERING FRAMEWORK FOR DETECTING VOICE & SMS PHISHING ATTACKS - A CASE STUDY OF M-PESA

  • Type: Project
  • Department: Management
  • Project ID: MGT0081
  • Access Fee: ₦5,000 ($14)
  • Pages: 106 Pages
  • Format: Microsoft Word
  • Views: 427
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Social engineering refers to the use of deception by an attacker, with the intent of psychologically manipulating the target/victim, into sharing crucial/confidential information which could either be leaked or used to swindle them. Without a clear understanding of social engineering, mobile users may be highly likely to be victims of social engineering crimes. Regarding social engineering on the mobile money platform, there are few existing documents/statistics on the study. Therefore, this research study focuses on social engineering on M-Pesa. The specific objectives of the study are: evaluating the prevalence of social engineering crimes, suggesting solutions that can deter them, and creating a framework that could be used to detect social engineering threats in M-Pesa.

Going beyond the methods used by social engineers, this study reviews the current comprehension of social engineering on M-Pesa. To gain good understanding of this issue, this research presents results of a survey conducted by the author, for testing the feasibility of the study.

According to our data, it was observed that 87% of the sample population had agreed that social engineering was indeed prevalent. On most occasions the social engineers / attackers usually take advantage of people’s lack of knowledge on the topic to psychologically manipulate them. The study revealed that despite having technological solutions to defend against social engineering, the best way of mitigating against such threats would be using security education, training and awareness programs.

The study led to the development of the Mobile Money Social Engineering (MMSE) detection framework that aids mobile users in detecting against social engineering threats that occur via Voice Calls and SMS. The proposed framework was derived from careful review and evaluation of the survey participant’s responses. This framework serves as a point of reference for future research in the field of social engineering on the mobile money platform. It could also be adopted and evaluated by experts with the aim of improving it further. Mobile service providers could also use this framework in combination with their institutional training programs to provide support to mobile users. 

A MOBILE MONEY SOCIAL ENGINEERING FRAMEWORK FOR DETECTING VOICE & SMS PHISHING ATTACKS - A CASE STUDY OF M-PESA
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Management
  • Project ID: MGT0081
  • Access Fee: ₦5,000 ($14)
  • Pages: 106 Pages
  • Format: Microsoft Word
  • Views: 427
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Management
    Project ID MGT0081
    Fee ₦5,000 ($14)
    No of Pages 106 Pages
    Format Microsoft Word

    Related Works

    Social engineering refers to the use of deception by an attacker, with the intent of psychologically manipulating the target/victim, into sharing crucial/confidential information which could either be leaked or used to swindle them. Without a clear understanding of social engineering, mobile users may be highly likely to be victims of social... Continue Reading
    ABSTRACT Social engineering is one of the most common attacking vectors in mobile money transactions. With the increasing rate of mobile money use, it has directly increased the number of social engineering incidents in mobile money services. It is therefore important to evolve a framework for detecting malicious and phishing messages. This could... Continue Reading
    TABLE OF CONTENTS DECLARATION APPROVAL DEDICATION ACKNOWLEDGEMENT iv LIST OF ACRONYMS vii TABLE OF CONTENTS ABSTRACT CHAPTER ONE 1 [NTRODUCTION 1 1.0 Introduction 1 1.1 Background to the study 1 1.1.1 Historical background Perspective 1 1.1.2 Theoretical perspective 2 1.1.3 Conceptual Perspective 3 1.1.4 Contextual Perspective 4 1.2 Problem... Continue Reading
    Table of Contents DECLARATION ii APPROVAL 1 DEDICATION ACKNOWLEDGEMENT v LIST OF TABLES LIST OF FIGURES x ABSTRACT CHAPTER ONE 1 1.0. Introduction 1 Li. 0. Background 1 1.1.1. Flistorical perspective 1 1.1.2 Theoretical frame work 1 1.1.3 Conceptual perspective 2 1.1.4 Contextual perspective 3 1.2. Problem statement 3 1.3. Objectives of the study... Continue Reading
    DECLARATION -~·•··················································································~·····················APPROVAL ............................ Continue Reading
    The proliferation of Android smartphones has propagated negative societal issues that  resulted in successful arrests of the culprits, forensic examination and prosecution. Other  such cases have collapsed due to alteration of forensic evidence as a result of inadequate  forensic sound frameworks. The purpose of this study was to develop and... Continue Reading
    TABLE OF CONTENT DECLARATION i APPROVAL DEDICATION TABLE OF CONTENT iv ABSTRACT VII CHAPTER ONE 1 INTRODUCTION 1 1.1 Introduction 1 1.2 Background to the study 1 1.2.1 Historical Background 1 1.2.2 Theoretical Background 2 1.2.3 Conceptual Background 2 1.2.4 Contextual Background 3 1.3 Statement of the Problem 4 1.4 Purpose of the Study 4 1.5... Continue Reading
    Abstract The report explored the effect of taxation on mobile money services a case of Makindye East division, Kampala district. The specific objectives of the study were; to establish the level of taxation on mobile money services in Makindye East Division Kampala district, to determine the level of mobile money services in Makindye East Division... Continue Reading
    ABSTRACT This study sought to develop a framework for the implementation of mobile Enterprise Resource Planning (m-ERP) System to improve healthcare services in Zimbabwe: A case of Chitungwiza central hospital. Information was gathered using a case study research strategy accompanied with interviews, questionnaire, records review and observation... Continue Reading
    Crime profiling helps law enforcement agencies understand, tackle and sometimes predict the next move by criminals. This can be achieved by monitoring and studying patterns and trends that have occurred in the past and continue to occur in the present. Social media platforms such as Facebook, Google Plus, Instagram, Reddit and in this case... Continue Reading
    Call Us
    whatsappWhatsApp Us