Model of Social Influence in Analysis of Socio-engineering Attacks
The purpose of this study is to study the modernization of the model of an attacker’s social engineering attack on a user, taking into account a wider range of factors influencing the success of a social engineering attack associated with the principles of social influence. Methods. To achieve this...
Guardado en:
Autores principales: | , , |
---|---|
Formato: | article |
Lenguaje: | EN RU |
Publicado: |
North-West institute of management of the Russian Presidential Academy of National Economy and Public Administration
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/11a8c7e2bd9e40a6894b10ac8b009100 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:11a8c7e2bd9e40a6894b10ac8b009100 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:11a8c7e2bd9e40a6894b10ac8b0091002021-11-12T10:46:15ZModel of Social Influence in Analysis of Socio-engineering Attacks1726-11391816-859010.22394/1726-1139-2021-8-97-107https://doaj.org/article/11a8c7e2bd9e40a6894b10ac8b0091002021-10-01T00:00:00Zhttps://www.acjournal.ru/jour/article/view/1763https://doaj.org/toc/1726-1139https://doaj.org/toc/1816-8590The purpose of this study is to study the modernization of the model of an attacker’s social engineering attack on a user, taking into account a wider range of factors influencing the success of a social engineering attack associated with the principles of social influence. Methods. To achieve this goal, the approaches to social influence and the components of social influence were analyzed. An integrated circuit of social influence is built, grounding in the context of socio-engineering attacks. Results. A model of social influence is proposed, built in the context of an attacker’s social engineering attack on a user. A new interpretation of the term user vulnerability in the context of information security has been proposed. Conclusion. The result obtained forms the potential of filling the user and attacker models with specific vulnerabilities and competencies, which will lead to a more accurate assessment of the success of the attacker’s social engineering attack on the user, due to the aggregation of information from incidents that have occurred.T. V. TulupievaM. V. AbramovA. L. TulupievNorth-West institute of management of the Russian Presidential Academy of National Economy and Public Administration articlesocial impactsocio-engineering attacksuser vulnerabilityattack impactPolitical institutions and public administration (General)JF20-2112ENRUУправленческое консультирование, Vol 0, Iss 8, Pp 97-107 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN RU |
topic |
social impact socio-engineering attacks user vulnerability attack impact Political institutions and public administration (General) JF20-2112 |
spellingShingle |
social impact socio-engineering attacks user vulnerability attack impact Political institutions and public administration (General) JF20-2112 T. V. Tulupieva M. V. Abramov A. L. Tulupiev Model of Social Influence in Analysis of Socio-engineering Attacks |
description |
The purpose of this study is to study the modernization of the model of an attacker’s social engineering attack on a user, taking into account a wider range of factors influencing the success of a social engineering attack associated with the principles of social influence. Methods. To achieve this goal, the approaches to social influence and the components of social influence were analyzed. An integrated circuit of social influence is built, grounding in the context of socio-engineering attacks. Results. A model of social influence is proposed, built in the context of an attacker’s social engineering attack on a user. A new interpretation of the term user vulnerability in the context of information security has been proposed. Conclusion. The result obtained forms the potential of filling the user and attacker models with specific vulnerabilities and competencies, which will lead to a more accurate assessment of the success of the attacker’s social engineering attack on the user, due to the aggregation of information from incidents that have occurred. |
format |
article |
author |
T. V. Tulupieva M. V. Abramov A. L. Tulupiev |
author_facet |
T. V. Tulupieva M. V. Abramov A. L. Tulupiev |
author_sort |
T. V. Tulupieva |
title |
Model of Social Influence in Analysis of Socio-engineering Attacks |
title_short |
Model of Social Influence in Analysis of Socio-engineering Attacks |
title_full |
Model of Social Influence in Analysis of Socio-engineering Attacks |
title_fullStr |
Model of Social Influence in Analysis of Socio-engineering Attacks |
title_full_unstemmed |
Model of Social Influence in Analysis of Socio-engineering Attacks |
title_sort |
model of social influence in analysis of socio-engineering attacks |
publisher |
North-West institute of management of the Russian Presidential Academy of National Economy and Public Administration |
publishDate |
2021 |
url |
https://doaj.org/article/11a8c7e2bd9e40a6894b10ac8b009100 |
work_keys_str_mv |
AT tvtulupieva modelofsocialinfluenceinanalysisofsocioengineeringattacks AT mvabramov modelofsocialinfluenceinanalysisofsocioengineeringattacks AT altulupiev modelofsocialinfluenceinanalysisofsocioengineeringattacks |
_version_ |
1718430661414486016 |