Abstract

The paper presents the main key features of social engineering and a social engineer activity. Emphasis is placed on the study of social engineering techniques in the system of human-machine interaction used to implement the illegal (malicious) manipulation of human behavior patterns. The matrix of social engineering qualification criteria and the map of information security risks caused by social engineer actions were built.

Highlights

  • The practice of human-machine interaction (HMI) makes increasingly high demands on the level of information security

  • A computer will learn how to evaluate human behavior [7,8] and make decisions based on the results of cognitive processes analysis, considering the value and semantic aspects of personality behavior

  • The social nature of information security threats is being actively studied [Dalpiaz, F], and means are proposed against the influence of the human factor [Luo, X], Pritchard, M]

Read more

Summary

Introduction

The practice of human-machine interaction (HMI) makes increasingly high demands on the level of information security. This process is like an eternal dispute - what is stronger, a sword or a shield. Nowadays people are actively embedding computers in their environment; they are trying to make the computer more "human", the level of computer dependence on the outside world increases with the development of networks [2, 3]. The human factor continues to be the least controlled element of HMI [4], which, in turn, according to the modern information and communication technologies development creates new opportunities, and new risks [5]. The number of information security [6] vulnerability factors increases. Long as a person is only understandable by the other person, the social engineering knowledge will be in demand [9]

Introduction to the problem
Models and methods
Results and discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call