Social engineering as a method of information and telecommunication systems intelligence
DOI:
https://doi.org/10.18372/2410-7840.14.3471Keywords:
social engineering, cyber intelligence, information and telecommunication systems intelligence, ІТS intelligence, cyberspaceAbstract
The rapid technological development of information society that circulates, accumulates and is processed in information and cyberspace leads to the increase of information. This process requires the development of new (improving existing) strategies and methods for searching and collecting information in an open, relatively open closed electronic sources. The solution of these tasks is possible within such a promising activity, as information and telecommunication systems (ІТS) intelligence, integrated research that neither domestic nor foreign specialists until this time wasn’t conducted. On the basis of the analysis of open sources there were revealed the main aspects, features, techniques and methods of ITS intelligence and determined that it would be recognized as the most effective means of identifying, preventing, countering and dealing with a variety of cyber intrusions and threats. The most effective and powerful way of ITS intelligence in the nearest futures will definitely stay the cyber intelligence, is designed to search and collect information, especially in the Internet, and the most effective is a method of social engineering designed to organize an access to the most protected information resources.References
В. Бычек. Социальная инженерия в интеллектуальной битве “добра” и “зла”. / В. Бычек, Е. Єршова // [Електронний ресурс]. – Режим доступу: http://www.aladdin-rd.ru/company/pressroom/articles/11475/ .
Бурячок В.Л. До питання організації та проведення розвідки у кібернетичному просторі. / Бурячок В.Л., Гулак Г.М., Хорошко В.О. // Наука і оборона. – 2011. – №2. – С. 19– 23.
Бурячок В.Л. Поняття кібервійни та розвідки інформаційно-телекомунікаційних систем у контексті захисту держави від стороннього кібернетичного впливу / В.Л. Бурячок, О.А. Ільяшов, Г.М. Гулак. // Збірник матеріалів круглого столу “Актуальні питання підготовки фахівців із розслідування
кіберзлочинів”, 25.11.2011. – К.: Наук.-вид. відділ НА СБ України, 2011. – С. 27–32.
Козиол Дж. Искусство взлома и защиты систем. / Дж. Козиол, Д. Личфилд, Д. Эйтэл, К. Энли и др. // .– СПб: Питер, 2006. – 416 с: ил.
М. Кузнецов. Социальная инженерия и социальные хакеры. / М. Кузнецов, И. Симдянов. // – Петербург: БХВ-Петербург, 2007. – 368 c.
Крис Касперски. Секретное оружие социальной инженерии. [Електронний ресурс]. – Режим доступу:
http://kpnc.opennet.ru/SOC_ENG.pdf.
[Електронний ресурс]. – Режим доступу: ru.wikipedia.org
Современные угрозы и каналы утечки информации в компьютерных сетях. [Електронний ресурс]. – Режим доступу: http://bibliofond.ru/view.aspx?id=67579.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).