Social engineering tactics used in mobile money theft in Tanzania

Show simple item record

dc.contributor.author Bakar, Issa Hamad
dc.date.accessioned 2019-08-28T07:41:55Z
dc.date.available 2019-08-28T07:41:55Z
dc.date.issued 2016
dc.identifier.citation Bakar I. H. (2016). Social engineering tactics used in mobile money theft in Tanzania en_US
dc.identifier.uri http://hdl.handle.net/20.500.12661/1168
dc.description Dissertation (MSc Computer Science) en_US
dc.description.abstract Social engineering is one of the most common attacking vectors in mobile money transactions. With the increasing rate of mobile money use, it has directly increased the number of social engineering incidents in mobile money services. It is therefore important to evolve a framework for detecting malicious and phishing messages. This could help to reduce threats posed by mobile phone criminals. As of now, some customers and agents have already lost thousands of shillings due to social engineering attacks. This study, investigated the common social engineering techniques used by cybercriminals to steal money from mobile money users. PIN sharing, lack of security awareness, PIN requests and storing PINs in address books were recognized as major sources of vulnerability in mobile money theft. The study revealed that, mobile money users were conned by social engineers using techniques such as, business collaboration benefits, alleged wrong remittance of money, SIM swaps, impersonation of mobile company officials, promotional benefits, employment opportunities, SMS phishing and fraudulent SMS from lost or stolen phones. The study recommends that mobile network operators set time limit for customers to reset their PINs. They should also periodically provide security education to their customers through advertisements and SMS. Customers are also advised not to share their PINs or store them in the address book of their phones to reduce exposure to cyber criminals. Furthermore governmental institutions are advised to acquire professional knowledge, get educational trainings and form strong collaboration to fight against cybercrimes in general and social engineering particularly. en_US
dc.publisher The University of Dodoma en_US
dc.subject Social engineering en_US
dc.subject Mobile money en_US
dc.subject Mobile money theft en_US
dc.subject Tanzania en_US
dc.subject Mobile money transaction en_US
dc.subject Mobile money services en_US
dc.subject Mobile money criminals en_US
dc.title Social engineering tactics used in mobile money theft in Tanzania en_US
dc.type Dissertation en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UDOM-IR


Browse

My Account