Social engineering in the context of ensuring information security
The paper presents the main key features of social engineering and a social engineer activity. Emphasis is placed on the study of social engineering techniques in the system of human-machine interaction used to implement the illegal (malicious) manipulation of human behavior patterns. The matrix of...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2019-01-01
|
Series: | SHS Web of Conferences |
Online Access: | https://www.shs-conferences.org/articles/shsconf/pdf/2019/10/shsconf_cildiah2019_00073.pdf |
id |
doaj-2d0e6eb25de0441093c2e5856e83495a |
---|---|
record_format |
Article |
spelling |
doaj-2d0e6eb25de0441093c2e5856e83495a2021-02-02T04:56:05ZengEDP SciencesSHS Web of Conferences2261-24242019-01-01690007310.1051/shsconf/20196900073shsconf_cildiah2019_00073Social engineering in the context of ensuring information securityMamedova NataliaUrintsov ArkadiyStaroverova OlgaIvanov EvgeniyGalahov DmitriyThe paper presents the main key features of social engineering and a social engineer activity. Emphasis is placed on the study of social engineering techniques in the system of human-machine interaction used to implement the illegal (malicious) manipulation of human behavior patterns. The matrix of social engineering qualification criteria and the map of information security risks caused by social engineer actions were built.https://www.shs-conferences.org/articles/shsconf/pdf/2019/10/shsconf_cildiah2019_00073.pdf |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Mamedova Natalia Urintsov Arkadiy Staroverova Olga Ivanov Evgeniy Galahov Dmitriy |
spellingShingle |
Mamedova Natalia Urintsov Arkadiy Staroverova Olga Ivanov Evgeniy Galahov Dmitriy Social engineering in the context of ensuring information security SHS Web of Conferences |
author_facet |
Mamedova Natalia Urintsov Arkadiy Staroverova Olga Ivanov Evgeniy Galahov Dmitriy |
author_sort |
Mamedova Natalia |
title |
Social engineering in the context of ensuring information security |
title_short |
Social engineering in the context of ensuring information security |
title_full |
Social engineering in the context of ensuring information security |
title_fullStr |
Social engineering in the context of ensuring information security |
title_full_unstemmed |
Social engineering in the context of ensuring information security |
title_sort |
social engineering in the context of ensuring information security |
publisher |
EDP Sciences |
series |
SHS Web of Conferences |
issn |
2261-2424 |
publishDate |
2019-01-01 |
description |
The paper presents the main key features of social engineering and a social engineer activity. Emphasis is placed on the study of social engineering techniques in the system of human-machine interaction used to implement the illegal (malicious) manipulation of human behavior patterns. The matrix of social engineering qualification criteria and the map of information security risks caused by social engineer actions were built. |
url |
https://www.shs-conferences.org/articles/shsconf/pdf/2019/10/shsconf_cildiah2019_00073.pdf |
work_keys_str_mv |
AT mamedovanatalia socialengineeringinthecontextofensuringinformationsecurity AT urintsovarkadiy socialengineeringinthecontextofensuringinformationsecurity AT staroverovaolga socialengineeringinthecontextofensuringinformationsecurity AT ivanovevgeniy socialengineeringinthecontextofensuringinformationsecurity AT galahovdmitriy socialengineeringinthecontextofensuringinformationsecurity |
_version_ |
1724304624148545536 |