Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс: https://dspace.ncfu.ru/handle/20.500.12258/25812
Название: CLASSIFICATION OF SOCIAL ENGINEERING METHODS AND TYPES OF SOCIAL ENGINEERING ATTACKS
Другие названия: CLASSIFICAÇÃO DOS MÉTODOS DE ENGENHARIA SOCIAL E TIPOS DE ATAQUES DE ENGENHARIA SOCIAL
Авторы: Bersei, D. D.
Берсей, Д. Д.
Dolgopolov, K. A.
Долгополов, К. А.
Amvrosova, O. N.
Амвросова, О. Н.
Zhukova, T. G.
Жукова, Т. Г.
Sherbakova, L. M.
Щербакова, Л. М.
Ключевые слова: Access;Social engineering methods;Protected objects;Social engineering;Social engineering attacks
Дата публикации: 2023
Библиографическое описание: Bersei, D., Dolgopolov, K., Amvrosova, O., Zhukova, T., Sherbakova, L. CLASSIFICATION OF SOCIAL ENGINEERING METHODS AND TYPES OF SOCIAL ENGINEERING ATTACKS // Relacoes Internacionais no Mundo Atual. - 2023. - 2 (40). - статья № e-6377. - pp. 19-32. - DOI: 10.21902/Revrima.v2i40.6377
Источник: Relacoes Internacionais no Mundo Atual
Краткий осмотр (реферат): Social engineering is an acute threat to modern enterprises. In large companies, dynamic information flows and changes in management processes increase the number of attack points for social engineers, which entails possible unwanted information outflows. Objective: The study aims to analyze social engineering attacks, identify their complexity, and compare them with the types of attacks. The primary objective is to determine the key mechanisms to counter social engineering. Methods: The paper analyzes the current body of scientific literature concerning the legal regulation of social engineering methods and the study of criminalized social engineering. The methodological foundation of the study is a combination of scientific research methods, including the abstract-logical approach, correlation analysis, and the comparative method. Results: The existing research testifies to the dynamic spread and development of social engineering technologies, which necessitates the development of an effective system to counter social engineering attacks. The most promising approach appears to be the one based on the technical component and simultaneously involving the training of employees of enterprises and organizations in counteracting unauthorized access to information. This approach will reduce the risk of information leakage and strengthen the information security of modern companies.
URI (Унифицированный идентификатор ресурса): http://hdl.handle.net/20.500.12258/25812
Располагается в коллекциях:Статьи, проиндексированные в SCOPUS, WOS

Файлы этого ресурса:
Файл РазмерФормат 
scopusresults 2805 .pdf
  Доступ ограничен
134.83 kBAdobe PDFПросмотреть/Открыть


Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.