﻿{"id":104,"date":"2020-09-28T01:26:44","date_gmt":"2020-09-28T01:26:44","guid":{"rendered":"https:\/\/wpmu.mau.se\/nmict202group9\/?p=104"},"modified":"2024-04-19T09:17:10","modified_gmt":"2024-04-19T09:17:10","slug":"ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya","status":"publish","type":"post","link":"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/","title":{"rendered":"IST-Africa 2020 Conference: Social engineering-based cyber attacks in Kenya"},"content":{"rendered":"<div id=\"fb-root\"><\/div>\r\n\n<p>Reading time: 4 minutes, 12 seconds.<\/p>\n\n\n\n<p>For this week\u2019s blog post, I am presenting the highlights of James Obuhuma\u2019s presentation of his report on \u201cSocial engineering-based cyber attacks in Kenya\u201d during the IST-Africa 2020 Conference Proceedings, Session 20. This report is written by James Obuhuma and Shingai Zivuku, and its main objective is to introduce an analytical approach towards social engineering in Kenya and to develop a model for controlling and minimizing cyber attacks.<\/p>\n\n\n\n<p>Cybersecurity is a compelling challenge in the period of the fourth Industrial Revolution and the Internet of Things (IoT) booms. While cybercriminal activities are perceived as complex happenings, organizations invest in technology to protect from cybercriminal strategies and create defense-in-depth strategies. Yet, social engineering is one of the greatest threats to information systems (IS) since social engineering results in psychological attacks and exploits the weakest layer of IS: people. To explore the level of understanding of the diverse forms of social engineering of Kenyans, Obuhuma and Zivuku collected information through an online survey and face to face interviews.&nbsp;<\/p>\n\n\n\n<p>The study shows that Kenyans did not know for certain what social engineering was unless it was explained to them. However, they were mostly familiar with the terms smishing (41%), them phishing (39%), and lastly vishing (36%), as shown in Figure 1.&nbsp;To clarify, <strong>phishing<\/strong> is a form of financial fraud that misleads people by email. <strong>Smishing<\/strong> is when criminals send text messages (SMS) to encourage people to pay on suspicious links, while<strong> vishing<\/strong> includes a fraudulent phone call where criminals attempt to persuade people to provide information needed for financial gain.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"443\" height=\"256\" src=\"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2b-e1601255525908.png\" alt=\"Graph: Familiarity of forms of social engineering\" class=\"wp-image-106\" srcset=\"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2b-e1601255525908.png 443w, https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2b-e1601255525908-300x173.png 300w, https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2b-e1601255525908-430x248.png 430w\" sizes=\"auto, (max-width: 443px) 100vw, 443px\" \/><figcaption>Figure 1: Familiarity of forms of social engineering<\/figcaption><\/figure><\/div>\n\n\n\n<p>While social engineering attacks were mainly vishing (47%) and smishing (44%) in Kenya, phishing was slightly less (with a score of 28%) compared to the other forms as evident in Figure 2. Vishing and smishing is much more prevalent because of the growth in mobile phone usage and mobile money transfers, unprotected personal data by mobile money transfer agents. Furthermore, these forms of attacks are also applicable to feature phones. As personal data is collected by money transfer agents, this enables attackers to gain more information about target victims. Smishing is also a cheaper form of cyber-attack because of its low cost of SMS. Despite the fact that vishing and smishing are relatively more common compared to phishing, phishing involves writing long convincing messages with clickable links to phishing sites. This factor gives it the upper hand rather than vishing and smishing. In addition to this, the study identifies the motives behind the cyber-attacks as financial gain and identity theft with the aim of getting financial gain.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"478\" height=\"266\" src=\"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2c-e1601255508761.png\" alt=\"Graph: Form of social engineering used on victims\" class=\"wp-image-107\" srcset=\"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2c-e1601255508761.png 478w, https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2c-e1601255508761-300x167.png 300w, https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2c-e1601255508761-430x239.png 430w\" sizes=\"auto, (max-width: 478px) 100vw, 478px\" \/><figcaption>Figure 2: Form of social engineering used on victims<\/figcaption><\/figure><\/div>\n\n\n\n<p>As shown in Figure 3, there are six general persuasion skills that are used by cyber-attackers to make people not realize that they are being attacked: authority, social proof, liking, scarcity, consistency and reciprocity <strong>(Bullee et al., 2018)<\/strong>. Authority is used the most compared to other persuasion skills. Authority, in this context, refers to the idea that attackers put themselves in an authority position to let people think that information is requested from a higher position.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"454\" height=\"288\" src=\"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2d.png\" alt=\"Graph: Persuasion principle used\" class=\"wp-image-108\" srcset=\"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2d.png 454w, https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2d-300x190.png 300w, https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2d-430x273.png 430w\" sizes=\"auto, (max-width: 454px) 100vw, 454px\" \/><figcaption>Figure 3: Persuasion principles used<\/figcaption><\/figure><\/div>\n\n\n\n<p>More than half of Kenya\u2019s population feels as if there are no laws on social engineering. While a few people stated that there are laws on social engineering, they could not quote any of the laws. While suggested solutions for these cyber attacks involve user education, enactment of laws, enforcement of laws, strict penalties including blacklisting, innovative solutions (AI Prediction Systems), regulation and tough laws for telcos, special police unit, formulation of policy, resolution facilitation for law enforcers, prompt incidence response, better data and network administration, IP address tracking, and media surveillance, Obuhuma demonstrates that increasing user education and awareness is the core solution. Enhanced knowledge and awareness of users can help to identify the persuasion skills and hinder the risk of being a victim of cyber attacks.<\/p>\n\n\n\n<p>As shown in Figure 4, the Social Engineering Model encompasses key phases such as knowledge acquisition, knowledge representation, knowledge validation, inferencing and explanation, and justification.&nbsp; Acquisition and validation of knowledge requires domain experts to disclose knowledge and turn it into rules and guidelines for people to use. In this way, specific rules and guidelines will enable the inference engine to correlate users\u2019 actions against the persuasion principles. \u2018Training and testing engine\u2019 aids to test and link to the knowledge while \u2018user interface\u2019 is a chatbot that could be a web application or mobile app that provides efficient interaction for users. This model helps to create awareness for the users and it helps them to provide a capability to identify the persuasion principles.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"578\" height=\"352\" src=\"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2e.png\" alt=\"Social engineering awareness model\" class=\"wp-image-109\" srcset=\"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2e.png 578w, https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2e-300x183.png 300w, https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2e-430x262.png 430w\" sizes=\"auto, (max-width: 578px) 100vw, 578px\" \/><figcaption>Figure 4: Social engineering awareness model<\/figcaption><\/figure><\/div>\n\n\n\n<p>As many Kenyans become victims of Social Engineering attacks because of their lack of awareness and\/or user education, Obuhuma and Zivuku\u2019s study shows that there should be an awareness model to generate a society with more knowledge of cyber-attacks and reduce the rate of successful attacks. As the weakest link to IS is people, this model can be beneficial for individuals and organizations at the same time.<\/p>\n\n\n\n<p>Do you think that this model would be efficient?&nbsp;<br>We would love to hear your thoughts on this study!<\/p>\n\n\n\n<p>Download the full report <a rel=\"noreferrer noopener\" href=\"https:\/\/ieeexplore.ieee.org\/document\/9144006\" target=\"_blank\">here<\/a>.&nbsp;<br>The presentation is also available for users on <a rel=\"noreferrer noopener\" href=\"https:\/\/www.youtube.com\/watch?v=nLSPOOZmDkk&amp;ab_channel=IST-AfricaInstitute\" target=\"_blank\">Youtube<\/a>.<\/p>\n\n\n\n<p>This post is written by Aylin Karaarslan. <a href=\"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/19\/about-the-authors\/\">Find out more about the authors of this blog.<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>References<\/strong><\/h3>\n\n\n\n<p>Bull\u00e9e, J.W.H., Montoya, L., Pieters, W., Junger, M., &amp; Hartel, P. (2018, January). On the<br>anatomy of social engineering attacks\u2014A literature-based dissection of successful&nbsp;<br>attacks. <em>Journal of Investigative Psychology and Offender Profiling<\/em>, 15 (1): 20\u201345.<br>45.&nbsp;<a href=\"https:\/\/doi.org\/10.1002\/jip.1482\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/doi.org\/10.1002\/jip.1482<\/a><\/p>\n\n\n\n<p>Obuhuma, J., &amp; Zivuku, S. (2020, May 20). Social Engineering Based Cyber-Attacks in Kenya<br>[Paper presentation]. In Cunningham, M., &amp; Cunningham, P. (Eds). <em>IST-Africa 2020 <br> Conference Proceedings.<\/em> IST-Africa Institute and IIMC, Session 20, ISBN: 978-1-905824-<br>64-9.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Highlights of James Obuhuma\u2019s presentation of his report on \u201cSocial Engineering-Based Cyber Attacks in Kenya\u201d during the IST-Africa 2020 Conference, which introduces an analytical approach towards social engineering in Kenya and develops a model for controlling and minimizing cyber attacks.<\/p>\n","protected":false},"author":55,"featured_media":111,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[30,31,32,36,33,34,29,35],"class_list":["post-104","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-justice","tag-cyber-attacks","tag-cybersecurity","tag-information-systems","tag-kenya","tag-phishing","tag-smishing","tag-social-engineering","tag-vishing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>IST-Africa 2020 Conference: Social engineering-based cyber attacks in Kenya - Decoding Data for Development<\/title>\r\n<meta name=\"description\" content=\"Highlights of James Obuhuma\u2019s \u201cSocial Engineering-Based Cyber Attacks in Kenya\u201d during the IST-Africa 2020 Conference.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"IST-Africa 2020 Conference: Social engineering-based cyber attacks in Kenya - Decoding Data for Development\" \/>\r\n<meta property=\"og:description\" content=\"Highlights of James Obuhuma\u2019s \u201cSocial Engineering-Based Cyber Attacks in Kenya\u201d during the IST-Africa 2020 Conference.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Decoding Data for Development\" \/>\r\n<meta property=\"article:published_time\" content=\"2020-09-28T01:26:44+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-04-19T09:17:10+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\r\n\t<meta property=\"og:image:height\" content=\"559\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"Aylin Karaarslan\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aylin Karaarslan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/2020\\\/09\\\/28\\\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/2020\\\/09\\\/28\\\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\\\/\"},\"author\":{\"name\":\"Aylin Karaarslan\",\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/#\\\/schema\\\/person\\\/86f00a10793c6788b445a8925e24f826\"},\"headline\":\"IST-Africa 2020 Conference: Social engineering-based cyber attacks in Kenya\",\"datePublished\":\"2020-09-28T01:26:44+00:00\",\"dateModified\":\"2024-04-19T09:17:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/2020\\\/09\\\/28\\\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\\\/\"},\"wordCount\":978,\"publisher\":{\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/2020\\\/09\\\/28\\\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/wp-content\\\/uploads\\\/sites\\\/11\\\/2020\\\/09\\\/aylin-blog2.jpg\",\"keywords\":[\"cyber attacks\",\"cybersecurity\",\"information systems\",\"kenya\",\"phishing\",\"smishing\",\"social engineering\",\"vishing\"],\"articleSection\":[\"Justice\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/2020\\\/09\\\/28\\\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\\\/\",\"url\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/2020\\\/09\\\/28\\\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\\\/\",\"name\":\"IST-Africa 2020 Conference: Social engineering-based cyber attacks in Kenya - Decoding Data for Development\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/2020\\\/09\\\/28\\\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/2020\\\/09\\\/28\\\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/wp-content\\\/uploads\\\/sites\\\/11\\\/2020\\\/09\\\/aylin-blog2.jpg\",\"datePublished\":\"2020-09-28T01:26:44+00:00\",\"dateModified\":\"2024-04-19T09:17:10+00:00\",\"description\":\"Highlights of James Obuhuma\u2019s \u201cSocial Engineering-Based Cyber Attacks in Kenya\u201d during the IST-Africa 2020 Conference.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/2020\\\/09\\\/28\\\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/2020\\\/09\\\/28\\\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/2020\\\/09\\\/28\\\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/wp-content\\\/uploads\\\/sites\\\/11\\\/2020\\\/09\\\/aylin-blog2.jpg\",\"contentUrl\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/wp-content\\\/uploads\\\/sites\\\/11\\\/2020\\\/09\\\/aylin-blog2.jpg\",\"width\":1000,\"height\":559,\"caption\":\"Graphic of person at computer with papers, cards, keys etc. around them\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/2020\\\/09\\\/28\\\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IST-Africa 2020 Conference: Social engineering-based cyber attacks in Kenya\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/#website\",\"url\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/\",\"name\":\"Decoding Data for Development\",\"description\":\"Notes on digital communication, datafication and social media in international development.\",\"publisher\":{\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/#organization\",\"name\":\"Decoding Data for Development\",\"url\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/wp-content\\\/uploads\\\/sites\\\/11\\\/2020\\\/09\\\/cropped-earth-internet-globalisation-technology-fullsize-resized-2.jpg\",\"contentUrl\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/wp-content\\\/uploads\\\/sites\\\/11\\\/2020\\\/09\\\/cropped-earth-internet-globalisation-technology-fullsize-resized-2.jpg\",\"width\":1082,\"height\":1181,\"caption\":\"Decoding Data for Development\"},\"image\":{\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/#\\\/schema\\\/person\\\/86f00a10793c6788b445a8925e24f826\",\"name\":\"Aylin Karaarslan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/117fa8635ae317c69d3ff53a6a2b50739e6bcf15ccc2214dd365df73b8727706?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/117fa8635ae317c69d3ff53a6a2b50739e6bcf15ccc2214dd365df73b8727706?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/117fa8635ae317c69d3ff53a6a2b50739e6bcf15ccc2214dd365df73b8727706?s=96&d=mm&r=g\",\"caption\":\"Aylin Karaarslan\"},\"url\":\"https:\\\/\\\/wpmu.mau.se\\\/nmict202group9\\\/author\\\/aj6636\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IST-Africa 2020 Conference: Social engineering-based cyber attacks in Kenya - Decoding Data for Development","description":"Highlights of James Obuhuma\u2019s \u201cSocial Engineering-Based Cyber Attacks in Kenya\u201d during the IST-Africa 2020 Conference.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/","og_locale":"en_US","og_type":"article","og_title":"IST-Africa 2020 Conference: Social engineering-based cyber attacks in Kenya - Decoding Data for Development","og_description":"Highlights of James Obuhuma\u2019s \u201cSocial Engineering-Based Cyber Attacks in Kenya\u201d during the IST-Africa 2020 Conference.","og_url":"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/","og_site_name":"Decoding Data for Development","article_published_time":"2020-09-28T01:26:44+00:00","article_modified_time":"2024-04-19T09:17:10+00:00","og_image":[{"width":1000,"height":559,"url":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2.jpg","type":"image\/jpeg"}],"author":"Aylin Karaarslan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Aylin Karaarslan","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/#article","isPartOf":{"@id":"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/"},"author":{"name":"Aylin Karaarslan","@id":"https:\/\/wpmu.mau.se\/nmict202group9\/#\/schema\/person\/86f00a10793c6788b445a8925e24f826"},"headline":"IST-Africa 2020 Conference: Social engineering-based cyber attacks in Kenya","datePublished":"2020-09-28T01:26:44+00:00","dateModified":"2024-04-19T09:17:10+00:00","mainEntityOfPage":{"@id":"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/"},"wordCount":978,"publisher":{"@id":"https:\/\/wpmu.mau.se\/nmict202group9\/#organization"},"image":{"@id":"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/#primaryimage"},"thumbnailUrl":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2.jpg","keywords":["cyber attacks","cybersecurity","information systems","kenya","phishing","smishing","social engineering","vishing"],"articleSection":["Justice"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/","url":"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/","name":"IST-Africa 2020 Conference: Social engineering-based cyber attacks in Kenya - Decoding Data for Development","isPartOf":{"@id":"https:\/\/wpmu.mau.se\/nmict202group9\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/#primaryimage"},"image":{"@id":"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/#primaryimage"},"thumbnailUrl":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2.jpg","datePublished":"2020-09-28T01:26:44+00:00","dateModified":"2024-04-19T09:17:10+00:00","description":"Highlights of James Obuhuma\u2019s \u201cSocial Engineering-Based Cyber Attacks in Kenya\u201d during the IST-Africa 2020 Conference.","breadcrumb":{"@id":"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/#primaryimage","url":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2.jpg","contentUrl":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/aylin-blog2.jpg","width":1000,"height":559,"caption":"Graphic of person at computer with papers, cards, keys etc. around them"},{"@type":"BreadcrumbList","@id":"https:\/\/wpmu.mau.se\/nmict202group9\/2020\/09\/28\/ist-africa-2020-conference-social-engineering-based-cyber-attacks-in-kenya\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wpmu.mau.se\/nmict202group9\/"},{"@type":"ListItem","position":2,"name":"IST-Africa 2020 Conference: Social engineering-based cyber attacks in Kenya"}]},{"@type":"WebSite","@id":"https:\/\/wpmu.mau.se\/nmict202group9\/#website","url":"https:\/\/wpmu.mau.se\/nmict202group9\/","name":"Decoding Data for Development","description":"Notes on digital communication, datafication and social media in international development.","publisher":{"@id":"https:\/\/wpmu.mau.se\/nmict202group9\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wpmu.mau.se\/nmict202group9\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wpmu.mau.se\/nmict202group9\/#organization","name":"Decoding Data for Development","url":"https:\/\/wpmu.mau.se\/nmict202group9\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wpmu.mau.se\/nmict202group9\/#\/schema\/logo\/image\/","url":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/cropped-earth-internet-globalisation-technology-fullsize-resized-2.jpg","contentUrl":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-content\/uploads\/sites\/11\/2020\/09\/cropped-earth-internet-globalisation-technology-fullsize-resized-2.jpg","width":1082,"height":1181,"caption":"Decoding Data for Development"},"image":{"@id":"https:\/\/wpmu.mau.se\/nmict202group9\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/wpmu.mau.se\/nmict202group9\/#\/schema\/person\/86f00a10793c6788b445a8925e24f826","name":"Aylin Karaarslan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/117fa8635ae317c69d3ff53a6a2b50739e6bcf15ccc2214dd365df73b8727706?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/117fa8635ae317c69d3ff53a6a2b50739e6bcf15ccc2214dd365df73b8727706?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/117fa8635ae317c69d3ff53a6a2b50739e6bcf15ccc2214dd365df73b8727706?s=96&d=mm&r=g","caption":"Aylin Karaarslan"},"url":"https:\/\/wpmu.mau.se\/nmict202group9\/author\/aj6636\/"}]}},"_links":{"self":[{"href":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-json\/wp\/v2\/posts\/104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-json\/wp\/v2\/comments?post=104"}],"version-history":[{"count":7,"href":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-json\/wp\/v2\/posts\/104\/revisions"}],"predecessor-version":[{"id":252,"href":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-json\/wp\/v2\/posts\/104\/revisions\/252"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-json\/wp\/v2\/media\/111"}],"wp:attachment":[{"href":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-json\/wp\/v2\/media?parent=104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-json\/wp\/v2\/categories?post=104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpmu.mau.se\/nmict202group9\/wp-json\/wp\/v2\/tags?post=104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}