Protection against attacks using social engineering tools and methods

Objective.  In the modern world, innovative technologies are actively developing, communications are moving into the Internet space. Nevertheless, new technologies turned out to be in demand in the segment of organizations, individuals, cyber fraudsters and hackers. The purpose of the study is to an...

Full description

Bibliographic Details
Main Authors: V. A. Repenko, S. A. Reznichenko
Format: Article
Language:Russian
Published: Dagestan State Technical University 2023-02-01
Series:Вестник Дагестанского государственного технического университета: Технические науки
Subjects:
Online Access:https://vestnik.dgtu.ru/jour/article/view/1182
_version_ 1797700789584527360
author V. A. Repenko
S. A. Reznichenko
author_facet V. A. Repenko
S. A. Reznichenko
author_sort V. A. Repenko
collection DOAJ
description Objective.  In the modern world, innovative technologies are actively developing, communications are moving into the Internet space. Nevertheless, new technologies turned out to be in demand in the segment of organizations, individuals, cyber fraudsters and hackers. The purpose of the study is to analyze the essence and structure of modern social engineering, including reverse social engineering in the context of the digitalization of society.Method. Adapting the study to the current moment, it is clarified that technologies, developments and manipulative sociological tactics are picked up not just by hackers, but also by followers of radical ideas.Result. The optimal definition of the term "social engineering" is proposed - the identification and exploitation of incompetence, insufficient professional level or negligence of employees of an organization or individuals to obtain unauthorized access to confidential data; a set of technologies based on the use of the psychological specifics of a person.Conclusion. The novelty of the study lies in an in-depth study of the classification of types of attacks using social engineering methods and recommendations for countering and preventing them.
first_indexed 2024-03-12T04:27:40Z
format Article
id doaj.art-2e84dcd73d6648dba189a54643035065
institution Directory Open Access Journal
issn 2073-6185
2542-095X
language Russian
last_indexed 2024-03-12T04:27:40Z
publishDate 2023-02-01
publisher Dagestan State Technical University
record_format Article
series Вестник Дагестанского государственного технического университета: Технические науки
spelling doaj.art-2e84dcd73d6648dba189a546430350652023-09-03T10:15:27ZrusDagestan State Technical UniversityВестник Дагестанского государственного технического университета: Технические науки2073-61852542-095X2023-02-01494859610.21822/2073-6185-2022-49-4-85-96740Protection against attacks using social engineering tools and methodsV. A. Repenko0S. A. Reznichenko1Национальный исследовательский ядерный университет «МИФИ»Национальный исследовательский ядерный университет «МИФИ»; Финансовый университет при Правительстве РФ; Российский государственный университет нефти и газа (национальный исследовательский университет) им. И.М. Губкина; Российский государственный гуманитарный университетObjective.  In the modern world, innovative technologies are actively developing, communications are moving into the Internet space. Nevertheless, new technologies turned out to be in demand in the segment of organizations, individuals, cyber fraudsters and hackers. The purpose of the study is to analyze the essence and structure of modern social engineering, including reverse social engineering in the context of the digitalization of society.Method. Adapting the study to the current moment, it is clarified that technologies, developments and manipulative sociological tactics are picked up not just by hackers, but also by followers of radical ideas.Result. The optimal definition of the term "social engineering" is proposed - the identification and exploitation of incompetence, insufficient professional level or negligence of employees of an organization or individuals to obtain unauthorized access to confidential data; a set of technologies based on the use of the psychological specifics of a person.Conclusion. The novelty of the study lies in an in-depth study of the classification of types of attacks using social engineering methods and recommendations for countering and preventing them.https://vestnik.dgtu.ru/jour/article/view/1182социальная инженерияобратная социальная инженериякиберпреступникинформационные системыинтернеттехники манипуляциипользователипрограммное обеспечение
spellingShingle V. A. Repenko
S. A. Reznichenko
Protection against attacks using social engineering tools and methods
Вестник Дагестанского государственного технического университета: Технические науки
социальная инженерия
обратная социальная инженерия
киберпреступник
информационные системы
интернет
техники манипуляции
пользователи
программное обеспечение
title Protection against attacks using social engineering tools and methods
title_full Protection against attacks using social engineering tools and methods
title_fullStr Protection against attacks using social engineering tools and methods
title_full_unstemmed Protection against attacks using social engineering tools and methods
title_short Protection against attacks using social engineering tools and methods
title_sort protection against attacks using social engineering tools and methods
topic социальная инженерия
обратная социальная инженерия
киберпреступник
информационные системы
интернет
техники манипуляции
пользователи
программное обеспечение
url https://vestnik.dgtu.ru/jour/article/view/1182
work_keys_str_mv AT varepenko protectionagainstattacksusingsocialengineeringtoolsandmethods
AT sareznichenko protectionagainstattacksusingsocialengineeringtoolsandmethods