Extended classification of methods of social engineering
DOI:
https://doi.org/10.18372/2225-5036.20.7308Keywords:
social engineering attacks, social engineering methods, the classification of social engineering attacks, attribute classification methods of social engineeringAbstract
Due to the rapid development of modern information technologies of social engineering attacks are widespread and improvement. To develop and implement effective means of combating social engineering attacks (eg, such as information security management system) is necessary to have the most complete set of characteristics and components. Known classification requires additions and extensions to make possible a more effective means of resistance. Based on the analysis and synthesis of well-known publications on the subject field has been expanded known classification techniques of social engineering by introducing new characters and their components. In general classification includes 12 basic characteristics, integrates more than 50 characteristics. The results can be used, for example, for the construction of a risk assessment, the level of preparedness of personnel to combat social engineering attacks, etc.References
Корченко О.Г. Построение систем защиты информации на нечетких множествах. Теория и практические решения. – К. : «МК-Пресс», 2006. – 320 с.
Конеев И.Р., Беляев А.В. Информационная безопасность предприятия. – СПб: БХВ-Петербург, 2003. – 752 с.
Чириль Дж. Защита от хакеров. -СПб.: Питер, 2002. – 480 с.
Мак-Клар Стюард, Спенбреб Джоел, Курц Джордж. Секреты хакеров. Безопасность сетей – готовые решения. – 4-е изд.: Пер. с англ. – М.: Изд. дом «Вильямс», 2004. – 656 с.
Коул Ерик. Руководство по защите от хакеров: Пер. с англ. – М.: Изд. дом «Вильямс»., 2002. – 640 с.
Бабак В.П., Корченко О.Г. Інформаційна безпека та сучасні мережеві технології. Англ.-укр.-рос. слов. термінів. − К.: НАУ, 2003. − 670 с.
Класифікація методів соціального інжинірингу / О.Г. Корченко, Є.В. Паціра, Д.А. Горніцька // Захист інформації. – 2007. – №4 (36). – С.37-45.
Cristoper Hadnagy. Social Engineering. The art of Human Hacking. Wiley Publishing, Inc.,2011 – 477 p.
Корченко А. Г. Несанкционированный доступ к компьютерным системам и методы защиты: Учеб. пособие. – К.: КМУГА, 1998. – 116 с.
Robert B. Cialdini. The Science of Persuasion // Scientific American Magazine. – 2001, – №2. – Р. 76-81.
Кузнецов И.Н. Информация: сбор, защита, анализ. Учебник по информационно-аналитической работе. – М.: ООО Изд. Яуза, 2001. – 100 с.
НД ТЗІ 1.4-001-2000. Типове положення про службу захисту інформації в автоматизованій системі.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.