Protection against attacks using social engineering tools and methods
Objective. In the modern world, innovative technologies are actively developing, communications are moving into the Internet space. Nevertheless, new technologies turned out to be in demand in the segment of organizations, individuals, cyber fraudsters and hackers. The purpose of the study is to an...
Main Authors: | , |
---|---|
Format: | Article |
Language: | Russian |
Published: |
Dagestan State Technical University
2023-02-01
|
Series: | Вестник Дагестанского государственного технического университета: Технические науки |
Subjects: | |
Online Access: | https://vestnik.dgtu.ru/jour/article/view/1182 |
_version_ | 1797700789584527360 |
---|---|
author | V. A. Repenko S. A. Reznichenko |
author_facet | V. A. Repenko S. A. Reznichenko |
author_sort | V. A. Repenko |
collection | DOAJ |
description | Objective. In the modern world, innovative technologies are actively developing, communications are moving into the Internet space. Nevertheless, new technologies turned out to be in demand in the segment of organizations, individuals, cyber fraudsters and hackers. The purpose of the study is to analyze the essence and structure of modern social engineering, including reverse social engineering in the context of the digitalization of society.Method. Adapting the study to the current moment, it is clarified that technologies, developments and manipulative sociological tactics are picked up not just by hackers, but also by followers of radical ideas.Result. The optimal definition of the term "social engineering" is proposed - the identification and exploitation of incompetence, insufficient professional level or negligence of employees of an organization or individuals to obtain unauthorized access to confidential data; a set of technologies based on the use of the psychological specifics of a person.Conclusion. The novelty of the study lies in an in-depth study of the classification of types of attacks using social engineering methods and recommendations for countering and preventing them. |
first_indexed | 2024-03-12T04:27:40Z |
format | Article |
id | doaj.art-2e84dcd73d6648dba189a54643035065 |
institution | Directory Open Access Journal |
issn | 2073-6185 2542-095X |
language | Russian |
last_indexed | 2024-03-12T04:27:40Z |
publishDate | 2023-02-01 |
publisher | Dagestan State Technical University |
record_format | Article |
series | Вестник Дагестанского государственного технического университета: Технические науки |
spelling | doaj.art-2e84dcd73d6648dba189a546430350652023-09-03T10:15:27ZrusDagestan State Technical UniversityВестник Дагестанского государственного технического университета: Технические науки2073-61852542-095X2023-02-01494859610.21822/2073-6185-2022-49-4-85-96740Protection against attacks using social engineering tools and methodsV. A. Repenko0S. A. Reznichenko1Национальный исследовательский ядерный университет «МИФИ»Национальный исследовательский ядерный университет «МИФИ»; Финансовый университет при Правительстве РФ; Российский государственный университет нефти и газа (национальный исследовательский университет) им. И.М. Губкина; Российский государственный гуманитарный университетObjective. In the modern world, innovative technologies are actively developing, communications are moving into the Internet space. Nevertheless, new technologies turned out to be in demand in the segment of organizations, individuals, cyber fraudsters and hackers. The purpose of the study is to analyze the essence and structure of modern social engineering, including reverse social engineering in the context of the digitalization of society.Method. Adapting the study to the current moment, it is clarified that technologies, developments and manipulative sociological tactics are picked up not just by hackers, but also by followers of radical ideas.Result. The optimal definition of the term "social engineering" is proposed - the identification and exploitation of incompetence, insufficient professional level or negligence of employees of an organization or individuals to obtain unauthorized access to confidential data; a set of technologies based on the use of the psychological specifics of a person.Conclusion. The novelty of the study lies in an in-depth study of the classification of types of attacks using social engineering methods and recommendations for countering and preventing them.https://vestnik.dgtu.ru/jour/article/view/1182социальная инженерияобратная социальная инженериякиберпреступникинформационные системыинтернеттехники манипуляциипользователипрограммное обеспечение |
spellingShingle | V. A. Repenko S. A. Reznichenko Protection against attacks using social engineering tools and methods Вестник Дагестанского государственного технического университета: Технические науки социальная инженерия обратная социальная инженерия киберпреступник информационные системы интернет техники манипуляции пользователи программное обеспечение |
title | Protection against attacks using social engineering tools and methods |
title_full | Protection against attacks using social engineering tools and methods |
title_fullStr | Protection against attacks using social engineering tools and methods |
title_full_unstemmed | Protection against attacks using social engineering tools and methods |
title_short | Protection against attacks using social engineering tools and methods |
title_sort | protection against attacks using social engineering tools and methods |
topic | социальная инженерия обратная социальная инженерия киберпреступник информационные системы интернет техники манипуляции пользователи программное обеспечение |
url | https://vestnik.dgtu.ru/jour/article/view/1182 |
work_keys_str_mv | AT varepenko protectionagainstattacksusingsocialengineeringtoolsandmethods AT sareznichenko protectionagainstattacksusingsocialengineeringtoolsandmethods |