{"title":"多步骤社会工程攻击开发场景建模方法","authors":"A. Khlobystova, A. Tulupyev","doi":"10.1109/CTS53513.2021.9562746","DOIUrl":null,"url":null,"abstract":"Now Russian and foreign researchers are actively working on the problem of enhanced information security, specifically protect the organization from social engineering attacks. Which in turn can be direct and multistep. Multistep social engineering attacks are characterized by a chain of users become involved in the attack for obtain the greatest benefit by malefactors. The article focuses on improving approaches to modeling multistep social engineering attacks on the user. This study finds its application in the further design of complex information security management systems of an organization, namely, in the development of an automated complex for identifying the most critical nodes of an information system under social engineering attacks.","PeriodicalId":371882,"journal":{"name":"2021 IV International Conference on Control in Technical Systems (CTS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Approaches to Modeling Development Scenarios of Multistep Social Engineering Attacks\",\"authors\":\"A. Khlobystova, A. Tulupyev\",\"doi\":\"10.1109/CTS53513.2021.9562746\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Now Russian and foreign researchers are actively working on the problem of enhanced information security, specifically protect the organization from social engineering attacks. Which in turn can be direct and multistep. Multistep social engineering attacks are characterized by a chain of users become involved in the attack for obtain the greatest benefit by malefactors. The article focuses on improving approaches to modeling multistep social engineering attacks on the user. This study finds its application in the further design of complex information security management systems of an organization, namely, in the development of an automated complex for identifying the most critical nodes of an information system under social engineering attacks.\",\"PeriodicalId\":371882,\"journal\":{\"name\":\"2021 IV International Conference on Control in Technical Systems (CTS)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IV International Conference on Control in Technical Systems (CTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CTS53513.2021.9562746\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IV International Conference on Control in Technical Systems (CTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CTS53513.2021.9562746","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Approaches to Modeling Development Scenarios of Multistep Social Engineering Attacks
Now Russian and foreign researchers are actively working on the problem of enhanced information security, specifically protect the organization from social engineering attacks. Which in turn can be direct and multistep. Multistep social engineering attacks are characterized by a chain of users become involved in the attack for obtain the greatest benefit by malefactors. The article focuses on improving approaches to modeling multistep social engineering attacks on the user. This study finds its application in the further design of complex information security management systems of an organization, namely, in the development of an automated complex for identifying the most critical nodes of an information system under social engineering attacks.