Social Engineering: Application of Psychology to Information Security

Ivan Del Pozo, Mauricio Iturralde, Felipe Restrepo
{"title":"Social Engineering: Application of Psychology to Information Security","authors":"Ivan Del Pozo, Mauricio Iturralde, Felipe Restrepo","doi":"10.1109/W-FiCloud.2018.00023","DOIUrl":null,"url":null,"abstract":"Psychology and computer science are two scientific disciplines that focus on identifying the specific characteristics of information processing. The first analyzes human behavior, while the latter focuses on the construction of a technical tool that seeks to emulate the brain: the computer. Therefore, psychology is strongly tied to the moment people choose their passwords. Deceptive advertising often compensates through money, free products, services or other self-esteem tests to influence a product or service to appear on your social network, in order to increase their consumption among its followers and to take personal information without your consent. Security is subjective, and each individual will perceive security differently, since each person has different weaknesses. Subjectivity should not be the one who meditates to manage his own measures of protection against the Social Engineering, which refers to psychological manipulation of people into performing actions or divulging confidential information. This project is also based on the need to prevent attacks of information subtraction by obtaining and decrypting the keys of access, or in the worst case, obtaining passwords directly to the different services, bank accounts, credit cards of individuals, based on the information that a people exposed or share on their social networks. Additionally, it focuses on how attackers could obtain or decipher their passwords based on personal information obtained from such advertisements; providing a better vision of how hackers use the psychology applied to information security.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/W-FiCloud.2018.00023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Psychology and computer science are two scientific disciplines that focus on identifying the specific characteristics of information processing. The first analyzes human behavior, while the latter focuses on the construction of a technical tool that seeks to emulate the brain: the computer. Therefore, psychology is strongly tied to the moment people choose their passwords. Deceptive advertising often compensates through money, free products, services or other self-esteem tests to influence a product or service to appear on your social network, in order to increase their consumption among its followers and to take personal information without your consent. Security is subjective, and each individual will perceive security differently, since each person has different weaknesses. Subjectivity should not be the one who meditates to manage his own measures of protection against the Social Engineering, which refers to psychological manipulation of people into performing actions or divulging confidential information. This project is also based on the need to prevent attacks of information subtraction by obtaining and decrypting the keys of access, or in the worst case, obtaining passwords directly to the different services, bank accounts, credit cards of individuals, based on the information that a people exposed or share on their social networks. Additionally, it focuses on how attackers could obtain or decipher their passwords based on personal information obtained from such advertisements; providing a better vision of how hackers use the psychology applied to information security.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
社会工程:心理学在信息安全中的应用
心理学和计算机科学是两门专注于识别信息处理的具体特征的科学学科。前者分析人类行为,而后者侧重于构建一种试图模拟大脑的技术工具:计算机。因此,心理学与人们选择密码的时刻密切相关。欺骗性广告通常通过金钱、免费产品、服务或其他自尊测试来补偿,以影响产品或服务出现在你的社交网络上,以增加其在其追随者中的消费,并在未经你同意的情况下获取个人信息。安全是主观的,每个人对安全的感知不同,因为每个人都有不同的弱点。主体性不应该是一个人冥想管理自己的保护措施,以防止社会工程,这是指心理操纵人们采取行动或泄露机密信息。该项目也是基于需要通过获取和解密访问密钥来防止信息减法攻击,或者在最坏的情况下,根据人们在其社交网络上暴露或分享的信息,直接获取个人不同服务,银行账户,信用卡的密码。此外,它还侧重于攻击者如何根据从此类广告中获得的个人信息获取或破译密码;提供了一个更好的视角,黑客如何使用心理学应用于信息安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Battling the Fear of Public Speaking: Designing Software as a Service Solution for a Virtual Reality Therapy Study of Rule Placement Schemes for Minimizing TCAM Space and Effective Bandwidth Utilization in SDN A Proxy-Based Query Aggregation Method for Distributed Key-Value Stores Social Engineering: Application of Psychology to Information Security Design and Implementation of a Mobile Device for Blood Glucose Level Assessment
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1