Social engineering in the context of ensuring information security
The paper presents the main key features of social engineering and a social engineer activity. Emphasis is placed on the study of social engineering techniques in the system of human-machine interaction used to implement the illegal (malicious) manipulation of human behavior patterns. The matrix of...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2019-01-01
|
Series: | SHS Web of Conferences |
Online Access: | https://www.shs-conferences.org/articles/shsconf/pdf/2019/10/shsconf_cildiah2019_00073.pdf |
Summary: | The paper presents the main key features of social engineering and a social engineer activity. Emphasis is placed on the study of social engineering techniques in the system of human-machine interaction used to implement the illegal (malicious) manipulation of human behavior patterns. The matrix of social engineering qualification criteria and the map of information security risks caused by social engineer actions were built. |
---|---|
ISSN: | 2261-2424 |