THE ADVANCED METHOD OF PROTECTION OF PERSONAL DATA FROM ATTACKS USING SOCIAL ENGINEERING ALGORITHMS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2022.16.4562

Keywords:

method, social engineering, personal data, attack, information protection

Abstract

Social interaction of subjects in the modern world, in addition to positive forms, also has negative ones. In modern society it is impossible to do without social networks and in the modern world the Internet - technologies prevail. Currently, everyone connected to a computer is registered in at least one social network. Social networks attract people, because in today's world all people communicate, exchange information, and get acquainted, some people come up with a virtual world in which they can be fearless, and popular and thus abandon reality. The problem related to the security of personal data in social networks is the most relevant and interesting in modern society.

Analysis of methods of protection of personal data from attacks using social engineering algorithms showed that it is impossible to prefer any one method of protection of personal information. All methods of personal data protection purposefully affect the protection of information, but protection in full can not be provided by only one method.

 Based on the analysis of methods of personal data protection, we have proposed an improved method of protecting personal data from attacks using social engineering algorithms. Improvement is a combination of two existing methods aimed at improving the effectiveness of user training. Using the features of the proposed method formulated by us, it is the increase of user training that will provide better protection of personal data.

The main advantage of the proposed method is that it uses the synergy of existing methods, which are aimed at educating users and learning to protect their personal information.

The direction of further research: analysis and improvement of methods of attacks not only with the help of phishing social engineering but also with the help of other methods of social engineering of other types. Creating a mathematical model to protect personal information from attacks using social engineering methods.

 

Downloads

Download data is not yet available.

References

Law of Ukraine "On Information". https://zakon.rada.gov.ua/laws/show/2657-12#Text ..

Law of Ukraine "On Personal Data Protection". https://zakon.rada.gov.ua/laws/show/2297-17#Text

Buriachok, V. L., Tolubko, V. B., Khoroshko, V. O., Toliupa, S. V. (2015). Informatsiina ta kiberbezpeka: sotsiotekhnichnyi aspekt : pidruchnyk. DUT.

Anti-Phishing Phil. https://www.cmu.edu/iso/aware/phil/index.html.

Fishynh v OLX Dostavka. https://help.olx.ua/hc/uk/articles/360014371320-Fishynh-v-OLX-Dostavka.

Khoroshko, V. O., Khokhlachova, Yu. Ye. (2016). Information war. Mass media as an instrument of information influence on society. Part 1. Ukrainian Scientific Journal of Information Security, 22(3). https://doi.org/10.18372/2225-5036.22.11104

Yoshihara, T. (2001). Chinese information warfare: A phantom menace or emerging threat? Strategic Studies Institute, U.S. Army War College.

Liubarskyi, S. (2013). Mistse ta rol merezhevoi rozvidky v modeliakh informatsiinoho protyborstva. Zbirnyk naukovykh prats VITI NTUU «KPI», (1), 31–39.

Laptiev, O., Savchenko, V., Kotenko, A., Akhramovych, V., Samosyuk, V., Shuklin, G., Biehun, A. (2021). Method of Determining Trust and Protection of Personal Data in Social Networks. International Journal of Communication Networks and Information Security (IJCNIS), 13(1), 15-21.

Laptev, O.A., Sobchuk, V.V., Salandy, Y.P., Sachuk, Yu.V. (2019). Matematychna model struktury informatsiinoi seti na osnovi nestatsyonarnoi ierarkhichnoi ta statsionarnoi hypersety. Zbirnyk naukovykh prats Viiskovoho instytutu Kyivskoho natsionalnoho universytetu imeni Tarasa Shevchenka VIKNU, 64, 124 – 132.

Laptev, A., Sobchuk, V., Barabash, O., Musienko, A. (2019). Analysis of the main Approaches and Stages for Providing the Properties of the Functional Stability of the Information Systems of the Enterprise .Sciences of Europe, 1(42), 41 – 44.

Stefurak, O.R., Tykhonov, Yu.O., Laptiev, O.A., Zozulia, S.A. (2020). Udoskonalennia stokhastychnoi modeli z metoiu vyznachennia zahroz poshkodzhennia abo nesanktsionovanoho vytoku informatsii. Suchasnyi zakhyst informatsii: naukovo-tekhnichnyi zhurnal, 2(42), 19 – 26.

Yevseiev, S., Laptiev, O., Korol, O., Pohasii, S., Milevskyi, S., Khmelevsky, R. (2021). Analysis of information security threat assessment of the objects of information activity. International independent scientific journal, 1(34), 33 – 39.

10 populiarnыkh «fyshynhovыkh» tem v 2021 hodu po versyy Positive Technologies. https://www.ptsecurity.com/ru-ru/research/analytics/10-populyarnyh-fishingovyh-tem-v-2021-godu-po-versii-positive-technologies/

Cherniak, A. M., Prozorov, A. Yu. (2019). Aspekty zapobihannia pravoporushenniam u sferi vykorystannia bankivskykh platizhnykh kartok pid chas provedennia bezkontaktnykh y internet-platezhiv ta yikh kvalifikatsiia. Naukovij visnik Nacionalnoi akademii vnutrisnih sprav, 4(113), 8-14.

Shcho take fishynh? http://help.sslatcost.com/article/346?locale=uk.

Fishynh (Phishing), Vishynh (vishing), Farminh — shakhraistvo v Interneti Entsyklopediia internet reklamy. (b. d.). Entsyklopediia internet reklamy. http://vse-prosto.vestop.rf/fishing-phishing-vishing-vishing-farming.html

Szafranski, R. Theory of Information Warfare: Preparing For 2020. Airpower Journal. http://www.airpower.au.af.mil/airchronicles/apj/apj95/spr95_files/szfran.htm

Downloads


Abstract views: 425

Published

2022-06-30

How to Cite

Laptiev, S. . (2022). THE ADVANCED METHOD OF PROTECTION OF PERSONAL DATA FROM ATTACKS USING SOCIAL ENGINEERING ALGORITHMS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(16), 45–62. https://doi.org/10.28925/2663-4023.2022.16.4562