首页> 外文期刊>Quality Control, Transactions >Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods
【24h】

Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods

机译:网络安全社会工程:效应机制,人类脆弱性和攻击方法

获取原文
获取原文并翻译 | 示例
       

摘要

Social engineering attacks have posed a serious security threat to cyberspace. However, there is much we have yet to know regarding what and how lead to the success of social engineering attacks. This paper proposes a conceptual model which provides an integrative and structural perspective to describe how social engineering attacks work. Three core entities (effect mechanism, human vulnerability and attack method) are identified to help the understanding of how social engineering attacks take effect. Then, beyond the familiar scope, we analyze and discuss the effect mechanisms involving 6 aspects (persuasion, social influence, cognition & attitude & behavior, trust and deception, language & thought & decision, emotion and decision-making) and the human vulnerabilities involving 6 aspects (cognition and knowledge, behavior and habit, emotions and feelings, human nature, personality traits, individual characters) , respectively. Finally, 16 social engineering attack scenarios (including 13 attack methods) are presented to illustrate how these mechanisms, vulnerabilities and attack methods are used to explain the success of social engineering attacks. Besides, this paper offers lots of materials for security awareness training and future empirical research, and the model is also helpful to develop a domain ontology of social engineering in cybersecurity.
机译:社会工程攻击对网络空间构成了严重的安全威胁。但是,我们还有很多关于社会工程袭击成功的原因和如何导致的东西。本文提出了一种概念模型,提供了一种综合性和结构性的视角,以描述社会工程攻击如何工作。确定了三个核心实体(效果机制,人类脆弱性和攻击方法),以帮助了解社会工程攻击如何生效。然后,除了熟悉的范围之外,我们分析并讨论涉及6个方面的效果机制(劝说,社会影响,认知和态度,信任和欺骗,语言和思想和决定,情感和决策)和涉及6个方面的人类脆弱性<斜体XMLNS:MML =“http://www.w3.org/1998/math/mathml”xmlns:xlink =“http://www.w3.org/1999/xlink”>(认知和知识,行为和习惯,情绪和感受,人性,人格特征,个人角色分别。最后,提出了16个社会工程攻击场景(包括13条攻击方法)以说明这些机制,漏洞和攻击方法如何用于解释社会工程攻击的成功。此外,本文为安全意识培训和未来的实证研究提供了大量的材料,而且该模型也有助于在网络安全中开发社会工程的域本体论。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号