Abstract
Malicious communications aimed at tricking employees are a serious threat for organizations, necessitating the creation of procedures and policies for quickly respond to ongoing attacks. While automated measures provide some protection, they cannot completely protect an organization. In this case study, we use interviews and observations to explore the processes staff at a large University use when handling reports of malicious communication, including how the help desk processes reports, whom they escalate them to, and how teams who manage protections such as the firewalls and mail relays use these reports to improve defenses. We found that the process and work patterns are a distributed cognitive process requiring multiple distinct teams with narrow system access and tactic knowledge. Sudden large campaigns were found to overwhelm the help desk with reports, greatly impacting staff's workflow and hindering the effective application of mitigations and the potential for reflection. We detail potential improvements to ticketing systems and reflect on ITIL, a common framework of best practice in IT management.
Original language | English |
---|---|
Article number | 338 |
Number of pages | 32 |
Journal | Proceedings of the ACM on Human-Computer Interaction |
Volume | 5 |
Issue number | CSCW2 |
DOIs | |
Publication status | Published - 18 Oct 2021 |
Keywords
- distributed cognition
- ITIL framework
- phishing
- phishing incident
- phishing management
- reactive security