Implementation of Social Engineering Attack at Institution of Higher Education

Hu, Zhengbing and Buriachok, Volodymyr and Sokolov, V. Y. (2019) Implementation of Social Engineering Attack at Institution of Higher Education International Workshop on Cyber Hygiene & Conflict Management in Global Information Networks (CybHyg), 2654. pp. 155-164. ISSN 1613-0073

[thumbnail of Z_Hu_V_Buriachok_V_Sokolov_CybHyg.pdf]
Preview
Text
Z_Hu_V_Buriachok_V_Sokolov_CybHyg.pdf

Download (521kB) | Preview

Abstract

The paper shows an investigation utilizing assaults, for example, a phony passage and a phishing page. The past distributions on social building have been checked on, insights of separations are investigated and bearings and component of acknowledgment of assaults having components of social designing are examined. The information from the examination in three better places were gathered and investigated and the substance measurements were given. For examination, three classifications of advanced education organizations were picked: specialized, helpful and blended profiles. Since the exploration was led in instructive organizations during the week, most understudies in the test and graduate understudies partook in the test. For each instructive establishment, an enrollment structure layout was made that emulated the plan of the principle pages. Instances of equipment and programming execution of an average represent assault, information accumulation and investigation are given. So as to develop a test stand, generally accessible segments were picked to show that it is so natural to complete assaults of this sort without critical introductory expenses and uncommon aptitudes. The paper gives measurements on the quantity of associations, consent to utilize the location of the email and secret word, just as authorization to consequently move administration information to the program (cookies). The insights are prepared utilizing uniquely composed calculations. The proposed ways to deal with taking care of the issue of socio-specialized assaults can be utilized and executed for activity on any objects of data action.

Item Type: Article
Additional Information: DOI: 10/d64s EID: 2-s2.0-85091320429
Uncontrolled Keywords: attack; fishing; social engineering; wireless access point; protection; personal information
Subjects: Це архівна тематика Київського університету імені Бориса Грінченка > Статті у наукометричних базах > Scopus
Divisions: Це архівні підрозділи Київського університету імені Бориса Грінченка > Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка
Depositing User: Volodymyr Sokolov
Date Deposited: 28 Sep 2020 08:09
Last Modified: 28 Sep 2020 08:09
URI: https://elibrary.kubg.edu.ua/id/eprint/31886

Actions (login required)

View Item View Item