Method of vulnerabilities analysis of socio-technical systems to the social engineering influences

Authors

DOI:

https://doi.org/10.20535/2411-1031.2020.8.1.218001

Abstract

The use of social engineering is reduced to the interaction of the attacker with an employee of the organization. Such interaction is focused on receiving confidential information and is implemented in four phases: studying, establishing interaction, entering into trust, using trust. An example of the study of these phases is the social engineering optimizer. They are used by separating the attacker (social engineer) and protector (an employee of the organization). Each is initialized by two random decisions. Better among them is interpreted as an attacker. To achieve this, he adheres to social engineering methods. However, the consideration remains that during the interaction, the social engineer manipulates the employee's consciousness and, as a consequence, gains sensitive information. According to the socio-engineering approach, the vulnerabilities of the employee are interpreted as his weaknesses, needs, mania (passions), admiration. This leads to a new model of his behavior, creating favorable conditions for the implementation of threats to the use of social engineering. The manifestation of such forms is a fraud, deception, scam, intrigue, hoax, provocation. The social engineer intentionally influences the employee's mind against will, but with his or her consent. Therefore, it is important to take into account their psychological and personal qualities and professional competencies when interacting. In order to take into account the psychological and personal qualities, professional competencies of the social engineer and the employee of the organization, it is recommended that their interaction be represented by a social graph.

Author Biographies

Rostyslav Herasymov, Pukhov institute for modeling in energy engineering of the National academy of sciences of Ukraine, Kyiv

researcher

Olha Kruk, Pukhov institute for modeling in energy engineering of the National academy of sciences of Ukraine, Kyiv

junior researcher

Oksana Tsurkan, Pukhov institute for modeling in energy engineering of the National academy of sciences of Ukraine, Kyiv

junior researcher

Vadym Yashenkov, E.O. Paton electric welding institute of the National academy of sciences of Ukraine, Kyiv

academic expert

References

V. Mokhor, O. Tsurkan, R. Herasymov, O. Kruk, and V. Pokrovska, “Model of vulnerabilities analysis of socio-technical systems to the social engineering influences”, Cybersecurity: Education, Science, Technique, vol. 4, no. 8, pp. 165-173, 2020, doi: https://doi.org/10.28925/2663-4023.2020.8.165173.

V. V. Mokhor, O. V. Tsurkan, R. P. Herasymov, and V. V. Tsurkan, “Information Security Assessment of Computer Systems by Socio-engineering Approach”, Selected Papers of the XVII International Scientific and Practical Conference Information Technologies and Security, vol. 2067. Aachen, Germany: CEUR Workshop Proceedings, 2017, pp. 92-98. [Online]. Available: http://ceur-ws.org/Vol-2067/paper13.pdf. Accessed on: February 12, 2020.

O. G. Korchenko, D. A. Gornitska, and A. Yu. Gololobov, “Extended classification of methods of social engineering”, Ukrainian Scientific Journal of Information Security, vol. 20, no. 2, pp. 197-205, 2014, doi: https://doi.org/10.18372/2225-5036.20.7308.

F. Mouton, M. M. Malan, K. K. Kimppa, and H. S. Venter, “Necessity for ethics in social engineering research”, Computers & Security, vol. 55, pp. 114-127, doi: http://dx.doi.org/10.1016/j.cose.2015.09.0010167-4048.

W. R. Flores, and M. Ekstedt, “Shaping intention to resist social engineering through transformational leadership, information security culture and awareness”, Computers & Security, vol. 59, pp. 26-44, 2016, doi: http://dx.doi.org/10.1016/j.cose.2016.01.004.

M. Junger, L. Montoya, F.-J. Overink, “Priming and warnings are not effective to prevent social engineering attacks”, Computers in Human Behavior, vol. 66, pp. 75-87, 2017, doi: http://dx.doi.org/10.1016/j.chb.2016.09.012.

V. Y. Sokolov, and D. M. Kurbanmuradov, “Method of Counteraction in Social Engineering on Information Activity Objectives”, Cybersecurity: Education, Science, Technique, vol. 1, no. 1, pp. 6-16, 2018, doi: https://doi.org/10.28925/2663-4023.2018.1.616.

N. Abe, and M. Soltys, “Deploying Health Campaign Strategies to Defend Against Social Engineering Threats”, Procedia Computer Science, vol. 159, pp. 824-831, 2019, doi: https://doi.org/10.1016/j.procs.2019.09.241.

O. Tsurkan, R. Herasymov, and O. Kruk, “Methods of counteracting social engineering”, Information Technology and Security, vol. 7, iss. 2 (13), pp. 161-170, July-December 2019, doi: https://doi.org/10.20535/2411-1031.2019.7.2.190563.

F. Mouton, L. Leenen, and H. Venter, “Social engineering attack examples, templates and scenarios”, Computers & Security, vol. 59, pp. 1-54, June 2016, doi: https://doi.org/10.1016/j.2016.03.004.

F.-F. M. Amir, H.-K. Mostafa, and T.-M. Reza, ”The Social Engineering Optimizer (SEO)”, Engineering Applications of Artificial Intelligence, vol. 72, pp. 267-293, 2018, doi: https://doi.org/10.1016/j.engappai.2018.04.009.

O. V. Tsurkan, and T. M. Klymenko, “Vulnerability analysis of sociotechnical systems based on fuzzy social graphs”, in Proc. Scientific and Practical Conference of Pukhov Institute for Modelling in Energy Engineering of National Academy of Sciences of Ukraine Energy security in the era of digital transformation, Kyiv, 2019, pp. 28.

O. V. Tsurkan, R. P. Herasymov, and O. M. Kruk, “Presentation the interaction of the subject and the object of socio-engineering influence with a social graph”, in Proc. Fourth International Scientific and Technical Conference Computer and Informational Systems and Technologies, Kharkiv, 2020, pp. 46, doi: https://doi.org/10.30837/IVcsitic2020201371.

J. N. Moderson, and P. S. Nair, Fuzzy Graphs and Fuzzy Hypergraphs. Heidelberg, Germany: Physica-Verlag Heidelberg, 2000, doi: https://doi.org/10.1007/978-3-7908-1854-3.

L. Zadeh, Fundamentals of a new approach to the analysis of complex systems and decision-making processes. Matematika segodnja, Moscow, Russia: Znanie, 1974, pp. 5-49.

S. Wasserman, and K. Faust, Social Network Analysis: Methods and Applications. Cambridge, England: Cambridge University Press, 2012, doi: https://doi.org/10.1017/CBO9780511815478.

Published

2020-07-09

How to Cite

Herasymov, R., Kruk, O., Tsurkan, O., & Yashenkov, V. (2020). Method of vulnerabilities analysis of socio-technical systems to the social engineering influences. Collection "Information Technology and Security", 8(1), 31–39. https://doi.org/10.20535/2411-1031.2020.8.1.218001

Issue

Section

INFORMATION WARFARE