Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/20.500.12258/19385
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMawla, V.-
dc.contributor.authorМаула, В.-
dc.date.accessioned2022-03-29T09:37:19Z-
dc.date.available2022-03-29T09:37:19Z-
dc.date.issued2022-
dc.identifier.citationZolotarev, V., Zolotareva, E., Mawla, V. Phishing attacks digital trace analysis for security awareness // CEUR Workshop Proceedings. - 2022. - Том 3094. - Стр.: 176 - 181ru
dc.identifier.urihttp://hdl.handle.net/20.500.12258/19385-
dc.description.abstractThe presented work contains recommendations for collecting a digital trail of phishing attacks. Some examples of algorithms for collecting a digital trace, studied indicators, and collected data are considered. The features of working with a digital trace are given. The authors also provide a set of functions that an attacked system must have in order to successfully collect evidence of a phishing attack. There are also specific recommendations for working in the area of increasing user awareness in this area. The aim of the work is both to simplify the collection of evidence of such attacks, and to study the possibility of increasing the security of interaction between participants in network educational projects that are the object of social engineering attacks now. For this purpose, the examples given are tied to the properties of the object under study and are considered based on practical recommendations.ru
dc.language.isoenru
dc.publisherCEUR-WSru
dc.relation.ispartofseriesCEUR Workshop Proceedings-
dc.subjectAttackru
dc.subjectDigital traceru
dc.subjectEducationru
dc.subjectDigital evidenceru
dc.subjectPhishingru
dc.titlePhishing attacks digital trace analysis for security awarenessru
dc.typeСтатьяru
vkr.instИнститут цифрового развитияru
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File SizeFormat 
scopusresults 2124 .pdf
  Restricted Access
63.2 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.