INFORMATION SECURITY

SOCIAL ENGINEERING AS A HIGH CYBERSECURITY THREAT

  • 1 National Military University, Bulgaria1

Abstract

Cybersecurity became the most famous topic concerning security development. Having social engineering in mind, all technical devices can be beaten and a cyberattack can have success just having incompetent personnel employed. In this research paper, some real social engineering texts as e-mails are shown and malicious intends presented. Short analysis is made about SE letters subjects

Keywords

References

  1. Patel, Rahul. Kali Linux Social Engineering. PACKT. 2013. ISBN 978-1-78328-327-9
  2. Lena Laribee. Development of Methodical Social Engineering Taxonomy Project. Thesis, 2006. Naval Postgraduate School, https://faculty.nps.edu/ncrowe/oldstudents/laribeethesis.htm
  3. Metasploit framework, SET, URL: https://metasploit.help.rapid7.com/docs/quick-start-guide
  4. Христозов, Иван. Проблеми и предизвикателства пред изграждането на национална система за киберсигурност. Военен журнал. 2015, бр.3, ISSN 0861-7392, стр.7-13
  5. Боянов, Петър. Приложение на кибератаката от тип социално инженерство срещу правителствени агенции, частни организации и академични институции. Сборник научни трудове - Научна конференция с международно участие МАТТЕХ 2018. ISSN: 1314-3921, т.2, ч.1, с.42-51
  6. Фетфов, О., Боянов, П., Ташева, Ж., Трифонов, Т. Анализ на съвременните видове уязвимости и експлойти в компютърните мрежи и системи. Annual of Konstantin Preslavsky University of Shumen, Университетско идателство „Епископ Константин Преславски“, ISSN 1311-834X, Vol. VI E, 2016, с. 112-122
  7. URL: https://www.investor.bg/novini/261/a/cnn-za-hakerskata-ataka-sreshtu-nap-ciala-naciia-toku-shto-beshe-haknata-286105/
  8. Warning from National Revenue Agency of Bulgaria, URL: https://nra.bg/news?id=4094
  9. Warning from National Revenue Agency of Bulgaria, URL: https://nra.bg/news?id=4084
  10. Barbosa, Hugo. Social engineering and cyber security. International Technology, Education and Development Conference, DOI: 10.21125/inted.2017.1008 URL: https://www.researchgate.net/publication/315351300_SOCIAL_ ENGINEERING_AND_CYBER_SECURITY

Article full text

Download PDF