Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс:
https://dspace.ncfu.ru/handle/20.500.12258/25812| Название: | CLASSIFICATION OF SOCIAL ENGINEERING METHODS AND TYPES OF SOCIAL ENGINEERING ATTACKS |
| Другие названия: | CLASSIFICAÇÃO DOS MÉTODOS DE ENGENHARIA SOCIAL E TIPOS DE ATAQUES DE ENGENHARIA SOCIAL |
| Авторы: | Bersei, D. D. Берсей, Д. Д. Dolgopolov, K. A. Долгополов, К. А. Amvrosova, O. N. Амвросова, О. Н. Zhukova, T. G. Жукова, Т. Г. Sherbakova, L. M. Щербакова, Л. М. |
| Ключевые слова: | Access;Social engineering methods;Protected objects;Social engineering;Social engineering attacks |
| Дата публикации: | 2023 |
| Библиографическое описание: | Bersei, D., Dolgopolov, K., Amvrosova, O., Zhukova, T., Sherbakova, L. CLASSIFICATION OF SOCIAL ENGINEERING METHODS AND TYPES OF SOCIAL ENGINEERING ATTACKS // Relacoes Internacionais no Mundo Atual. - 2023. - 2 (40). - статья № e-6377. - pp. 19-32. - DOI: 10.21902/Revrima.v2i40.6377 |
| Источник: | Relacoes Internacionais no Mundo Atual |
| Краткий осмотр (реферат): | Social engineering is an acute threat to modern enterprises. In large companies, dynamic information flows and changes in management processes increase the number of attack points for social engineers, which entails possible unwanted information outflows. Objective: The study aims to analyze social engineering attacks, identify their complexity, and compare them with the types of attacks. The primary objective is to determine the key mechanisms to counter social engineering. Methods: The paper analyzes the current body of scientific literature concerning the legal regulation of social engineering methods and the study of criminalized social engineering. The methodological foundation of the study is a combination of scientific research methods, including the abstract-logical approach, correlation analysis, and the comparative method. Results: The existing research testifies to the dynamic spread and development of social engineering technologies, which necessitates the development of an effective system to counter social engineering attacks. The most promising approach appears to be the one based on the technical component and simultaneously involving the training of employees of enterprises and organizations in counteracting unauthorized access to information. This approach will reduce the risk of information leakage and strengthen the information security of modern companies. |
| URI (Унифицированный идентификатор ресурса): | http://hdl.handle.net/20.500.12258/25812 |
| Располагается в коллекциях: | Статьи, проиндексированные в SCOPUS, WOS |
Файлы этого ресурса:
| Файл | Размер | Формат | |
|---|---|---|---|
| scopusresults 2805 .pdf Доступ ограничен | 134.83 kB | Adobe PDF | Просмотреть/Открыть |
Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.