|

Social engineering: yesterday, today, tomorrow

Authors: Balakin K.A.
Published in issue: #6(35)/2019
DOI: 10.18698/2541-8009-2019-6-494


Category: Humanities | Chapter: Social sciences

Keywords: social engineering, information security, personal information, human factor, impact scheme, social engineering technologies, social engineering techniques, user safety
Published: 24.06.2019

In this paper, the author shows a topic within the context of the everyday world is an issue of information security. There are many ways of user’s data theft. The present paper describes the main stages of the history of the formation such phenomenon of modernity as social engineering, and analyzed its main techniques and protective devices. The author showed that modern information and communication environment and technical progress are unlimited sources, generating new types and techniques of social hacking. In addition, the potential scenario of the further development of this science, due to the transition system of society is described.


References

[1] Mitnick javascript: void(0)K.D., Simon javascript: void(0)W.L., Wozniak S. The art of deception: controlling the human element of security. Wiley, 2003. (Russ. ed.: Iskusstvo obmana. Mowcow, AyTi Publ., 2004.)

[2] Oratorskoe iskusstvo v antichnosti. Oratory Drevney Gretsii. Oratory Drevnego Rima [The art of rhetoric in ancient world. Orators of Ancient Greece. Orators of Ancient Rome]. myfilology.ru: website (in Russ.). URL: https://myfilology.ru/147/oratorskoe-iskusstvo-v-antichnosti-oratory-drevnej-greczii-oratory-drevnego-rima/ (accessed: 15.05.2019).

[3] Security Through Education: website. URL: https://www.social-engineer.org (accessed: 15.05.2019).

[4] Sotsial’naya inzheneriya, ili kak “vzlomat’” cheloveka [Social engineering or how to “hack” a person]. Kaspersky.ru: website (in Russ.). URL: https://www.kaspersky.ru/blog/socialnaya-inzheneriya-ili-kak-vzlomat-cheloveka/2559/ (accessed: 15.05.2019).

[5] GOST R 56205-2014. Seti kommunikatsionnye promyshlennye. Zashchishchennost’ (kiberbezopasnost’) seti i sistemy. Chast’ 1-1. Terminologiya, kontseptual’nye polozheniya i modeli [State standard R 56205-2014. Industrial communication networks. Network and system security. Part 1-1. Terminology, concepts and models]. Moscow, Standartinform Publ., 2014 (in Russ.).

[6] Kratkoe vvedenie v sotsial’nuyu inzheneriyu [Brief introduction into social engineering]. habr.com: website (in Russ.). URL: https://habr.com/ru/post/83415/ (accessed: 15.05.2019).

[7] Freeman L.C. The development of social network analysis. BookSurge, 2004.

[8] Testirovanie korporativnoy informatsionnoy sistemy na proniknovenie [Hacking test of corporative information system]. sp123.ru: website (in Russ.). URL: https://sp123.ru/services/testirovanie-vashey-korporativnoy-informatsionnoy-sistemy/ (accessed: 15.05.2019).

[9] Tikhonov A.V. Sociology of governance and administration: yesterday, today, tomorrow. Sotsiologicheskie issledovaniya, 2018, no. 2, pp. 105–110 (in Russ.).