Model of Social Influence in Analysis of Socio-engineering Attacks

The purpose of this study is to study the modernization of the model of an attacker’s social engineering attack on a user, taking into account a wider range of factors influencing the success of a social engineering attack associated with the principles of social influence. Methods. To achieve this...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: T. V. Tulupieva, M. V. Abramov, A. L. Tulupiev
Formato: article
Lenguaje:EN
RU
Publicado: North-West institute of management of the Russian Presidential Academy of National Economy and Public Administration 2021
Materias:
Acceso en línea:https://doaj.org/article/11a8c7e2bd9e40a6894b10ac8b009100
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:11a8c7e2bd9e40a6894b10ac8b009100
record_format dspace
spelling oai:doaj.org-article:11a8c7e2bd9e40a6894b10ac8b0091002021-11-12T10:46:15ZModel of Social Influence in Analysis of Socio-engineering Attacks1726-11391816-859010.22394/1726-1139-2021-8-97-107https://doaj.org/article/11a8c7e2bd9e40a6894b10ac8b0091002021-10-01T00:00:00Zhttps://www.acjournal.ru/jour/article/view/1763https://doaj.org/toc/1726-1139https://doaj.org/toc/1816-8590The purpose of this study is to study the modernization of the model of an attacker’s social engineering attack on a user, taking into account a wider range of factors influencing the success of a social engineering attack associated with the principles of social influence. Methods. To achieve this goal, the approaches to social influence and the components of social influence were analyzed. An integrated circuit of social influence is built, grounding in the context of socio-engineering attacks. Results. A model of social influence is proposed, built in the context of an attacker’s social engineering attack on a user. A new interpretation of the term user vulnerability in the context of information security has been proposed. Conclusion. The result obtained forms the potential of filling the user and attacker models with specific vulnerabilities and competencies, which will lead to a more accurate assessment of the success of the attacker’s social engineering attack on the user, due to the aggregation of information from incidents that have occurred.T. V. TulupievaM. V. AbramovA. L. TulupievNorth-West institute of management of the Russian Presidential Academy of National Economy and Public Administration articlesocial impactsocio-engineering attacksuser vulnerabilityattack impactPolitical institutions and public administration (General)JF20-2112ENRUУправленческое консультирование, Vol 0, Iss 8, Pp 97-107 (2021)
institution DOAJ
collection DOAJ
language EN
RU
topic social impact
socio-engineering attacks
user vulnerability
attack impact
Political institutions and public administration (General)
JF20-2112
spellingShingle social impact
socio-engineering attacks
user vulnerability
attack impact
Political institutions and public administration (General)
JF20-2112
T. V. Tulupieva
M. V. Abramov
A. L. Tulupiev
Model of Social Influence in Analysis of Socio-engineering Attacks
description The purpose of this study is to study the modernization of the model of an attacker’s social engineering attack on a user, taking into account a wider range of factors influencing the success of a social engineering attack associated with the principles of social influence. Methods. To achieve this goal, the approaches to social influence and the components of social influence were analyzed. An integrated circuit of social influence is built, grounding in the context of socio-engineering attacks. Results. A model of social influence is proposed, built in the context of an attacker’s social engineering attack on a user. A new interpretation of the term user vulnerability in the context of information security has been proposed. Conclusion. The result obtained forms the potential of filling the user and attacker models with specific vulnerabilities and competencies, which will lead to a more accurate assessment of the success of the attacker’s social engineering attack on the user, due to the aggregation of information from incidents that have occurred.
format article
author T. V. Tulupieva
M. V. Abramov
A. L. Tulupiev
author_facet T. V. Tulupieva
M. V. Abramov
A. L. Tulupiev
author_sort T. V. Tulupieva
title Model of Social Influence in Analysis of Socio-engineering Attacks
title_short Model of Social Influence in Analysis of Socio-engineering Attacks
title_full Model of Social Influence in Analysis of Socio-engineering Attacks
title_fullStr Model of Social Influence in Analysis of Socio-engineering Attacks
title_full_unstemmed Model of Social Influence in Analysis of Socio-engineering Attacks
title_sort model of social influence in analysis of socio-engineering attacks
publisher North-West institute of management of the Russian Presidential Academy of National Economy and Public Administration
publishDate 2021
url https://doaj.org/article/11a8c7e2bd9e40a6894b10ac8b009100
work_keys_str_mv AT tvtulupieva modelofsocialinfluenceinanalysisofsocioengineeringattacks
AT mvabramov modelofsocialinfluenceinanalysisofsocioengineeringattacks
AT altulupiev modelofsocialinfluenceinanalysisofsocioengineeringattacks
_version_ 1718430661414486016