DEVELOPMENT OF RECOMMENDATIONS FOR MINIMIZING THE RISKS OF ACCOUNT HACKING ON THE BASIS OF ANALYSIS OF THE MOST COMMON HACKING METHODS
DOI:
https://doi.org/10.28925/2663-4023.2020.12.163171Keywords:
multifactor authentication; phishing; password protection; biometric authenticationAbstract
With the spread of the Internet, social networks, messengers, etc. and their penetration
into all spheres of life of the modern individual, the number of attempts to obtain unauthorized
access to personal information of users is increasing. Accounts are the most vulnerable target for
hacking. Among the most common types of attacks - phishing, theft of cookies, use of keyloggers,
brute force. Social engineering techniques have become very popular among attackers. Using a
password in the form of a set of letters, numbers, and special characters is no longer sufficient to
provide the required level of account security. The introduction of combined systems increases the
number of identification features and increases data security. Systems based on contactless smart
cards, USB keys, hybrid smart cards, bioelectronic systems can be used as additional protection
mechanisms. One of the main recommendations for avoiding the consequences of fraudulent actions
is double or multifactor authentication to verify the identity of the client (requiring users to provide
data, such as a password, using other factors, such as a text message / SMS code or fingerprints).
Multi-factor authentication should be used on all available Internet services, where possible, to
ensure an acceptable level of security. There are two main types of multifactor authentication: the
MFA application, an authentication process that is activated when a user tries to access one or more
applications, and the MFA device, an authentication process that immediately activates the MFA at
the login point. One of the most common authentication factors is the phone number. Email codes,
text tokens, biometric verification, hardware tokens, security issues (secret issues) and more are also
used.
Downloads
References
V.L. Buryachok, V.B. Tolubko, V.O. Khoroshko, S.V. Tolyupa. Information and cybersecurity: sociotechnical aspect.— К.: SUT, 2015. - 288 с.
What is MFA - Multifactor Authentication? [Electronic resource]. Available: https://datami.ua/shho-takemfa-bagatofaktorna-autentifikatsiya/
S.I. Boloban, O.M. Pereguda, V.V. Uminsky, «Methods of authentication of users of information and
communication systems», Development and modernization of armaments and military equipment, №2. Рр.
-52, 2009.
KPMG-Ukraine. Global study on banking fraud [Electronic resource]. Available:
https://assets.kpmg/content/dam/kpmg/ua/pdf/2019/11/Global_Banking_Fraud_Survey.pdf
Datami. How to protect your own social networks? [Electronic resource]. Available: https://datami.ua/yakzahistiti-vlasni-sotsialni-merezhi/
A hacker from Ukraine has developed the world's largest phishing service for attacks on financial
institutions [Electronic resource]. Available: https://banda.media/ru/haker-z-ukrayiny-rozrobyvnajbilshyj-u-sviti-fishyng-servis-dlya-atak-na-finustanovy-kiberpolicziya/
Name the most common methods of hacking [Electronic resource]. Available:
https://uk.focuzcomputers.com/t-cnicas-de-hacking-comunes-que-debes-conocer
Mail hacking [Electronic resource]. Available:
https://brut4you.wordpress.com/2014/08/08/%D0%B2%D0%B7%D0%BB%D0%BE%D0%BC-
%D0%BF%D0%BE%D1%87%D1%82%D1%8B/
O.S. Kulchytsky, V.V. Hrytsiuk, I.G. Zotova, «Analysis of existing approaches to user identification and
authentication in information and telecommunication systems» , Collection of scientific works of the Center
for Military Strategic Studies of the Ivan Chernyakhovsky National University of Defense of Ukraine, №3.
Рр. 60-64, 2016.
J.P. Kis, V.M. Teslyuk, «Methods and means of authentication of biometric data in information systems»,
Current economic problems, №12 (138). Рр. 174-182, 2012.
O. Korchenko, A. Davydenko, O. Vysotska, «Method of authentication of users of information systems by
their handwriting with multi-step correction of primary data», Information protection, №1. Рр. 40-51, 2019.