Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/20.500.12258/25812
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBersei, D. D.-
dc.contributor.authorБерсей, Д. Д.-
dc.contributor.authorDolgopolov, K. A.-
dc.contributor.authorДолгополов, К. А.-
dc.contributor.authorAmvrosova, O. N.-
dc.contributor.authorАмвросова, О. Н.-
dc.contributor.authorZhukova, T. G.-
dc.contributor.authorЖукова, Т. Г.-
dc.contributor.authorSherbakova, L. M.-
dc.contributor.authorЩербакова, Л. М.-
dc.date.accessioned2023-11-16T14:32:11Z-
dc.date.available2023-11-16T14:32:11Z-
dc.date.issued2023-
dc.identifier.citationBersei, D., Dolgopolov, K., Amvrosova, O., Zhukova, T., Sherbakova, L. CLASSIFICATION OF SOCIAL ENGINEERING METHODS AND TYPES OF SOCIAL ENGINEERING ATTACKS // Relacoes Internacionais no Mundo Atual. - 2023. - 2 (40). - статья № e-6377. - pp. 19-32. - DOI: 10.21902/Revrima.v2i40.6377ru
dc.identifier.urihttp://hdl.handle.net/20.500.12258/25812-
dc.description.abstractSocial engineering is an acute threat to modern enterprises. In large companies, dynamic information flows and changes in management processes increase the number of attack points for social engineers, which entails possible unwanted information outflows. Objective: The study aims to analyze social engineering attacks, identify their complexity, and compare them with the types of attacks. The primary objective is to determine the key mechanisms to counter social engineering. Methods: The paper analyzes the current body of scientific literature concerning the legal regulation of social engineering methods and the study of criminalized social engineering. The methodological foundation of the study is a combination of scientific research methods, including the abstract-logical approach, correlation analysis, and the comparative method. Results: The existing research testifies to the dynamic spread and development of social engineering technologies, which necessitates the development of an effective system to counter social engineering attacks. The most promising approach appears to be the one based on the technical component and simultaneously involving the training of employees of enterprises and organizations in counteracting unauthorized access to information. This approach will reduce the risk of information leakage and strengthen the information security of modern companies.ru
dc.language.isoenru
dc.relation.ispartofseriesRelacoes Internacionais no Mundo Atual-
dc.subjectAccessru
dc.subjectSocial engineering methodsru
dc.subjectProtected objectsru
dc.subjectSocial engineeringru
dc.subjectSocial engineering attacksru
dc.titleCLASSIFICATION OF SOCIAL ENGINEERING METHODS AND TYPES OF SOCIAL ENGINEERING ATTACKSru
dc.title.alternativeCLASSIFICAÇÃO DOS MÉTODOS DE ENGENHARIA SOCIAL E TIPOS DE ATAQUES DE ENGENHARIA SOCIALru
dc.typeСтатьяru
vkr.instЮридический институтru
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File SizeFormat 
scopusresults 2805 .pdf
  Restricted Access
134.83 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.