Adaptation of the Multi-pass social Engineering Attack Model Taking into Account Informational Influence

Author(s):  
Anastasiia O. Khlobystova ◽  
Maxim V. Abramov
1973 ◽  
Vol 4 (2) ◽  
pp. 269-275
Author(s):  
Jan Gorecki
Keyword(s):  

2017 ◽  
Vol 8 (16) ◽  
Author(s):  
Agata C. Amato Mangiameli (Universidade de Roma – Tor Vergata)

This paper aims investigate the general theory and the elements of the computer crimes as well it social engineering, because as technology advances, more and more people use it according to their needs.


Author(s):  
Philipp Zehmisch

This chapter considers the history of Andaman migration from the institutionalization of a penal colony in 1858 to the present. It unpicks the dynamic relationship between the state and the population by investigating genealogies of power and knowledge. Apart from elaborating on subaltern domination, the chapter also reconstructs subaltern agency in historical processes by re-reading scholarly literature, administrative publications, and media reports as well as by interpreting fieldwork data and oral history accounts. The first part of the chapter defines migration and shows how it applies to the Andamans. The second part concentrates on colonial policies of subaltern population transfer to the islands and on the effects of social engineering processes. The third part analyses the institutionalization of the postcolonial regime in the islands and elaborates on the various types of migration since Indian Independence. The final section considers contemporary political negotiations of migration in the islands.


Sensors ◽  
2021 ◽  
Vol 21 (3) ◽  
pp. 991
Author(s):  
Peidong Zhu ◽  
Peng Xun ◽  
Yifan Hu ◽  
Yinqiao Xiong

A large-scale Cyber-Physical System (CPS) such as a smart grid usually provides service to a vast number of users as a public utility. Security is one of the most vital aspects in such critical infrastructures. The existing CPS security usually considers the attack from the information domain to the physical domain, such as injecting false data to damage sensing. Social Collective Attack on CPS (SCAC) is proposed as a new kind of attack that intrudes into the social domain and manipulates the collective behavior of social users to disrupt the physical subsystem. To provide a systematic description framework for such threats, we extend MITRE ATT&CK, the most used cyber adversary behavior modeling framework, to cover social, cyber, and physical domains. We discuss how the disinformation may be constructed and eventually leads to physical system malfunction through the social-cyber-physical interfaces, and we analyze how the adversaries launch disinformation attacks to better manipulate collective behavior. Finally, simulation analysis of SCAC in a smart grid is provided to demonstrate the possibility of such an attack.


2020 ◽  
Vol 11 (1) ◽  
pp. 285
Author(s):  
Runze Wu ◽  
Jinxin Gong ◽  
Weiyue Tong ◽  
Bing Fan

As the coupling relationship between information systems and physical power grids is getting closer, various types of cyber attacks have increased the operational risks of a power cyber-physical System (CPS). In order to effectively evaluate this risk, this paper proposed a method of cross-domain propagation analysis of a power CPS risk based on reinforcement learning. First, the Fuzzy Petri Net (FPN) was used to establish an attack model, and Q-Learning was improved through FPN. The attack gain was defined from the attacker’s point of view to obtain the best attack path. On this basis, a quantitative indicator of information-physical cross-domain spreading risk was put forward to analyze the impact of cyber attacks on the real-time operation of the power grid. Finally, the simulation based on Institute of Electrical and Electronics Engineers (IEEE) 14 power distribution system verifies the effectiveness of the proposed risk assessment method.


Sign in / Sign up

Export Citation Format

Share Document