Please use this identifier to cite or link to this item:
https://dspace.ncfu.ru/handle/20.500.12258/25812| Title: | CLASSIFICATION OF SOCIAL ENGINEERING METHODS AND TYPES OF SOCIAL ENGINEERING ATTACKS |
| Other Titles: | CLASSIFICAÇÃO DOS MÉTODOS DE ENGENHARIA SOCIAL E TIPOS DE ATAQUES DE ENGENHARIA SOCIAL |
| Authors: | Bersei, D. D. Берсей, Д. Д. Dolgopolov, K. A. Долгополов, К. А. Amvrosova, O. N. Амвросова, О. Н. Zhukova, T. G. Жукова, Т. Г. Sherbakova, L. M. Щербакова, Л. М. |
| Keywords: | Access;Social engineering methods;Protected objects;Social engineering;Social engineering attacks |
| Issue Date: | 2023 |
| Citation: | Bersei, D., Dolgopolov, K., Amvrosova, O., Zhukova, T., Sherbakova, L. CLASSIFICATION OF SOCIAL ENGINEERING METHODS AND TYPES OF SOCIAL ENGINEERING ATTACKS // Relacoes Internacionais no Mundo Atual. - 2023. - 2 (40). - статья № e-6377. - pp. 19-32. - DOI: 10.21902/Revrima.v2i40.6377 |
| Series/Report no.: | Relacoes Internacionais no Mundo Atual |
| Abstract: | Social engineering is an acute threat to modern enterprises. In large companies, dynamic information flows and changes in management processes increase the number of attack points for social engineers, which entails possible unwanted information outflows. Objective: The study aims to analyze social engineering attacks, identify their complexity, and compare them with the types of attacks. The primary objective is to determine the key mechanisms to counter social engineering. Methods: The paper analyzes the current body of scientific literature concerning the legal regulation of social engineering methods and the study of criminalized social engineering. The methodological foundation of the study is a combination of scientific research methods, including the abstract-logical approach, correlation analysis, and the comparative method. Results: The existing research testifies to the dynamic spread and development of social engineering technologies, which necessitates the development of an effective system to counter social engineering attacks. The most promising approach appears to be the one based on the technical component and simultaneously involving the training of employees of enterprises and organizations in counteracting unauthorized access to information. This approach will reduce the risk of information leakage and strengthen the information security of modern companies. |
| URI: | http://hdl.handle.net/20.500.12258/25812 |
| Appears in Collections: | Статьи, проиндексированные в SCOPUS, WOS |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| scopusresults 2805 .pdf Restricted Access | 134.83 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.