Phishing Awareness
Training Issues
Abstract
Phishing has been one of the most dangerous cyberattacks for quite a long time. Being a technically simple approach to implement for attackers, being quite well recognized by tools, having clearly recognizable features, this method of attack still remains operational. The reason is users who continue to follow prepared malicious links. It is people who turn out to be the weak link that ensures the success of phishing. Hence, much attention is paid in the world to educating (notifying) users about the dangers and characteristic features of phishing. In this article, we would like to focus on existing anti-phishing training programs in the world. Such programs exist at different levels: national, academic, in private companies. The basis of such training is the identification of phishing messages by students among real texts (email messages). Of particular interest is the NIST phishing scale, which allows you to assess the complexity of such training examples.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Publication policy of the journal is based on traditional ethical principles of the Russian scientific periodicals and is built in terms of ethical norms of editors and publishers work stated in Code of Conduct and Best Practice Guidelines for Journal Editors and Code of Conduct for Journal Publishers, developed by the Committee on Publication Ethics (COPE). In the course of publishing editorial board of the journal is led by international rules for copyright protection, statutory regulations of the Russian Federation as well as international standards of publishing.
Authors publishing articles in this journal agree to the following: They retain copyright and grant the journal right of first publication of the work, which is automatically licensed under the Creative Commons Attribution License (CC BY license). Users can use, reuse and build upon the material published in this journal provided that such uses are fully attributed.
