Method of Counteraction in Social Engineering on Information Activity Objectives

04/02/2019
by   Volodymyr Yu. Sokolov, et al.
0

The article presents a study using attacks such as a fake access point and a phishing page. The previous publications on social engineering have been reviewed, statistics of break-ups are analyzed and directions and mechanism of realization of attacks having elements of social engineering are analyzed. The data from the research in three different places were collected and analyzed and the content statistics were provided. For comparison, three categories of higher education institutions were chosen: technical, humanitarian and mixed profiles. Since the research was conducted in educational institutions during the week, most students in the experiment and graduate students took part in the experiment. For each educational institution, a registration form template was created that mimicked the design of the main pages. Examples of hardware and software implementation of a typical stand for attack, data collection and analysis are given. In order to construct a test stand, widely available components were chosen to show how easy it is to carry out attacks of this kind without significant initial costs and special skills. The article provides statistics on the number of connections, permission to use the address of the e-mail and password, as well as permission to automatically transfer service data to the browser (cookies). The statistics are processed using specially written algorithms. The proposed approaches to solving the problem of socio-technical attacks can be used and implemented for operation on any objects of information activity. As a result of the experiments, it is clear that the awareness of users of even technical specialties is not enough, so one needs to pay particular attention to the development of methods for raising awareness of users and reducing the number of potential attacks on objects of information activity.

READ FULL TEXT

page 2

page 6

page 7

page 8

research
11/26/2020

Using game simulator Software Inc in the Software Engineering education

The article presents the possibilities of using game simulator Sotware I...
research
03/02/2023

Interactive robots as inclusive tools to increase diversity in higher education

There is a major lack of diversity in engineering, technology, and compu...
research
03/11/2021

Towards Determining the Effect of Age and Educational Level on Cyber-Hygiene

As internet related challenges increase such as cyber-attacks, the need ...
research
07/23/2018

The mobile information and educational environment of higher educational institution

In the modern world in the conditions of informatization of society and ...
research
08/29/2023

TASEP: A Collaborative Social Engineering Tabletop Role-Playing Game to Prevent Successful Social Engineering Attacks

Data breaches resulting from targeted attacks against organizations, e.g...
research
06/24/2019

Evaluating the Information Security Awareness of Smartphone Users

Information security awareness (ISA) is a practice focused on the set of...
research
03/23/2021

Female ICT participation in South-Eastern Nigerian Tertiary Institutions: Inhibiting Factors

The study examined the participation of female students of South Eastern...

Please sign up or login with your details

Forgot password? Click here to reset