COUNTERACTION CRIMES COMMITTED BY THE METHODS OF SOCIAL ENGINEERING IN THE INTERNET

Keywords: cybercrime, social engineering, hackers, online-resource, phishing, web-site

Abstract

The authors have studied the concept of «social engineering», methods and techniques of social engineering, which are used for committing criminal activities in the Internet: Voice phishing, Pharming, Spear phishing, Whaling and others. The authors have determined the main features of the false messages, which are necessary for early detection of phishing attacks like: fake Web-links, logos, sender’s addresses of phishing messages. The authors have also considered techniques for obtaining illegal information online, which are used by cybercriminals like: «Trojan Horse», «The road apple», «Reverse social engineering», «shoulder surfing».

Based on the conducted research of the most spread algorithms of criminal acts in the Internet the authors have formulated some recommendations for the protection from social engineering techniques, primarily associated with training employees of companies, institutions, organizations and also ordinary citizens. The problems arising in the prevention and fighting against cybercrime have been defined; propositions (kinds of algorithms of the law enforcement employees’ actions) on using the techniques of social engineering to combat fraud in the Internet have been formulated in the paper. Contrary to the formed public opinion about phishing and social engineering as methods of criminal activity, they can and should be used primarily for the prevention and the fight against crime in the Internet.

Downloads

Download data is not yet available.

References

Орлов О. В., Онищенко Ю. М. Попередження кіберзлочинності – складова частина державної політики в Україні. Теорія та практика державного управління. 2014. Вип. 1 (44). С. 9–15.

Соціальна інженерія // Вікі-знання/Тернопіл. нац. техн. ун-т ім. Івана Пулюя. URL: http://wiki.tstu.edu.ua/Соціальна_інженерія (дата звернення: 10.11.2016).

The Social Engineering Infographic // Security trough Education: a free learning resourse/Social-Engineer, Inc. Apr. 28, 2014. URL: http://www.social-engineer.org/social-engineering/social-engineering-infographic/ (дата звернення: 10.11.2016).

Gunn J. Social Engineering and How to Win the Battle for Trust // VASCO: blog. Nov. 5, 2015. URL: http://blog.vasco.com/electronic-signature/social-engineering-win-battle-trust-infographic/ (дата звернення: 31.10.2016).

Що таке фішинг? // GoDaddy: сайт. URL: https://ua.godaddy.com/help/sho-take-fishing-346 (дата звернення: 10.11.2016).

Плечовий серфінг. URL: http://um.co.ua/4/4-5/4-57341.html (дата звернення: 10.11.2016).

Published
2018-10-30
How to Cite
Onyshchenko, Y. N., Petrov, K. E. and Kobzev, I. V. (2018) “COUNTERACTION CRIMES COMMITTED BY THE METHODS OF SOCIAL ENGINEERING IN THE INTERNET”, Law and Safety, 64(1), pp. 63-68. Available at: https://pb.univd.edu.ua/index.php/PB/article/view/129 (Accessed: 24November2024).
Section
THEORY AND PRACTICE OF LAW ENFORCEMENT ACTIVITY