Social engineering tactics used in mobile money theft in Tanzania
dc.contributor.author | Bakar, Issa Hamad | |
dc.date.accessioned | 2019-08-28T07:41:55Z | |
dc.date.available | 2019-08-28T07:41:55Z | |
dc.date.issued | 2016 | |
dc.description | Dissertation (MSc Computer Science) | en_US |
dc.description.abstract | Social engineering is one of the most common attacking vectors in mobile money transactions. With the increasing rate of mobile money use, it has directly increased the number of social engineering incidents in mobile money services. It is therefore important to evolve a framework for detecting malicious and phishing messages. This could help to reduce threats posed by mobile phone criminals. As of now, some customers and agents have already lost thousands of shillings due to social engineering attacks. This study, investigated the common social engineering techniques used by cybercriminals to steal money from mobile money users. PIN sharing, lack of security awareness, PIN requests and storing PINs in address books were recognized as major sources of vulnerability in mobile money theft. The study revealed that, mobile money users were conned by social engineers using techniques such as, business collaboration benefits, alleged wrong remittance of money, SIM swaps, impersonation of mobile company officials, promotional benefits, employment opportunities, SMS phishing and fraudulent SMS from lost or stolen phones. The study recommends that mobile network operators set time limit for customers to reset their PINs. They should also periodically provide security education to their customers through advertisements and SMS. Customers are also advised not to share their PINs or store them in the address book of their phones to reduce exposure to cyber criminals. Furthermore governmental institutions are advised to acquire professional knowledge, get educational trainings and form strong collaboration to fight against cybercrimes in general and social engineering particularly. | en_US |
dc.identifier.citation | Bakar I. H. (2016). Social engineering tactics used in mobile money theft in Tanzania | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12661/1168 | |
dc.publisher | The University of Dodoma | en_US |
dc.subject | Social engineering | en_US |
dc.subject | Mobile money | en_US |
dc.subject | Mobile money theft | en_US |
dc.subject | Tanzania | en_US |
dc.subject | Mobile money transaction | en_US |
dc.subject | Mobile money services | en_US |
dc.subject | Mobile money criminals | en_US |
dc.title | Social engineering tactics used in mobile money theft in Tanzania | en_US |
dc.type | Dissertation | en_US |