Social engineering as a threat to personal financial security

2021 ◽  
Vol 17 (1) ◽  
pp. 150-166
Author(s):  
Andrei L. LOMAKIN ◽  
Evgenii Yu. KHRUSTALEV ◽  
Gleb A. KOSTYURIN

Subject. As the socio-economic relationships are getting digitalized so quickly, the society faces more and more instances of cybercrime. To effectively prevent arising threats to personal information security, it is necessary to know key social engineering methods and security activities to mitigate consequences of emerging threats. Objectives. We herein analyze and detect arising information security threats associated with social engineering. We set forth basic guidelines for preventing threats and improving the personal security from social engineering approaches. Methods. The study relies upon methods of systems analysis, synthesis, analogy and generalization. Results. We determined the most frequent instances associated with social engineering, which cause personal information security threats and possible implications. The article outlines guidelines for improving the persona; security from social engineering approaches as an information security threat. Conclusions and Relevance. To make information security threats associated with social engineering less probable, there should be a comprehensive approach implying two strategies. First, the information security protection should be technologically improved, fitted with various data protection, antivirus, anti-fishing software. Second, people should be more aware of information security issues. Raising the public awareness, the government, heads of various departments, top executives of public and private organizations should set an integrated training system for people, civil servants, employees to proliferate the knowledge of information security basics.

2018 ◽  
pp. 674-702 ◽  
Author(s):  
Kouroush Jenab ◽  
Sam Khoury ◽  
Kim LaFevor

A flow-graph depicts the interrelationships among cyber security and security threats/incidents (i.e., internal, external, and accidental). Using a flow-graph, the manner in which security threats may affect systems can be investigated. This paper reports analytical approaches to analyze time to security threats and probability of security threat occurrence. Considering embedded threat detection functions in a safe-guard unit, the proposed approaches use the flow-graph concept, and Markovian method to calculate time to security threat occurrence and its probability. The threat detection functions are featured by incident detection and recovery mechanisms. The results of this study can be used by all parties (public and private sector organizations, service providers, IT, and insurance companies) to better deal with cyber security issues with respect to utilizing technology, investment, and insurance. An illustrative example is demonstrated to present the application of the approach.


2006 ◽  
Vol 25 (4) ◽  
pp. 222 ◽  
Author(s):  
Samuel T. C. Thompson

Social engineering is the use of nontechnical means to gain unauthorized access to information or computer systems. While this method is recognized as a major security threat in the computer industry, little has been done to address it in the library field. This is of particular concern because libraries increasingly have access to databases of both proprietary and personal information. This tutorial is designed to increase the awareness of library staff in regard to the issue of social engineering.


2021 ◽  
Vol 81 (2) ◽  
pp. 104-110
Author(s):  
Ye. V. Kobko ◽  
V. A. Kobko

The emphasis has been placed on the fact that the state is currently aware of the importance of information security within its territory and takes a number of important steps in this direction, such as the development of a new Information Security Strategy. However, such steps are difficult to consider objective, since they do not take into account a number of legal and organizational problems that need to be addressed promptly. Such problems include the following. First of all, the existence of an extensive regulatory and legal base in the information sphere in general and ensuring economic security, in particular. A large number of laws and by-laws different in their content and essence significantly complicates the development of comprehensive measures to ensure information security of Ukraine, and therefore needs to be improved. The latter can be implemented by codifying the said regulatory and legal base and by adopting the Code of Ukraine on Information and Information Relations, where a separate Section will be focused on information security issues. Secondly, the current conditions, where Ukraine finds itself, require the government to quickly adopt a new modern Information Security Strategy, which will include a number of measures aimed at improving such security level, since the latter is undoubtedly one of the important components of national security. Thirdly, the issue of ensuring certain aspects of information security is attributed to the tasks of various state authorities (Parliament, Government, executive authorities, law enforcement agencies, etc.). Moreover, such issues should be addressed at the local level by both legal entities and individuals, in the latter case we can talk about the personal information security of each person. This multiplicity of subjects of information security and the difference in their powers necessitates the creation of an appropriate coordinating agency with special powers in the mentioned area.


2019 ◽  
pp. 172-176
Author(s):  
Otegbulu M. I. ◽  
Ezeagu A. Agbo ◽  
Agbo Genevieve N.

Security is pre-requisite for the development of human beings and the society. It is a pre-condition for the survival, development and advancement of individuals and groups. The school is an organization that needs to have a planned safety rules and regulations to protect it components so that the culture of learning and teaching is enhanced. Security threat within the school environment could hamper the peaceful atmosphere in the school, and disrupt academic exercises and panic among the personnel in the school. The government, security agents, parents, school administrators and the community has a lot of role to play to make school environment safe and conducive. However, security gadgets and apparatus should be provided to nip these issues in the bud, as well as train the teaching and non-teaching staff on security issues.


2012 ◽  
Vol 3 (2) ◽  
pp. 57-69 ◽  
Author(s):  
Ali M. Al-Khouri

This article provides an overview of the literature surrounding emerging markets and the global paradigm shift taking place towards the development of digital economies. It provides a review of recent practices in the government sector. The article promotes the concept of developing a government based identity management infrastructure to support the progress en route for building the digital economy. In light of increasing information security threats in today’s interconnected world, the article emphasizes that only through identification and authentication capabilities, emerging markets can maintain sustainability.


2017 ◽  
Vol 7 (1.5) ◽  
pp. 253
Author(s):  
N. Srinivasu ◽  
O. Sree Priyanka ◽  
M. Prudhvi ◽  
G. Meghana

Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6.


2020 ◽  
Vol 3 (2) ◽  
pp. 205-209
Author(s):  
Dwi Agustina ◽  
Edy Mulyadi

The community is responsible for the implementation of the community early awareness, meanwhile the government is obliged to facilitate it. A good role of the Community Early Awareness Forum or Forum Kewaspadaan Dini Masyarakat (FKDM) followed up by the government can save the community from security threat or disaster and minimize losses by anticipating the security threats and disaster. This research uses qualitative approach. Concept operationalization in this research refers to the used strategy, the SWOT analysis. The FKDM strategies in social conflict early prevention are: 1) inserting early warning system by increasing institutional capacities which include three elements; government, private sector, community through dialogue, 2) National Unity and Politics Agency or Badan Kesatuan Bangsa dan Politik (Kesbangpol) of DKI Jakarta actively making dialogue persuasively and finding solution, 3) budgeting of conflict handling according to the Government Regulation gives opportunity to strengthen community resilience to protect the community, encourage community participation, handle social conflict, and preserve local wisdom to maintain peace.


2020 ◽  
Vol 1 (2) ◽  
pp. 120-131
Author(s):  
Indra Budi Jaya

Islam as a religion wants its people to always maintain a balance between religiosity (al din) and worldly problems (al dunya). The relationship between the two describes something that is separate but inseparable (harmony). However, for modern society, this condition often creates contradictions, this condition was seen at the time of the Covid 19 pandemic. The implementation of Large-Scale Social Restrictions by the government in an effort to overcome the spread of the impact of Covid 19 to the community by limiting activities in mosques and allowing activities in the market to continue in fact responded by the community differently. The methodology used is qualitative by using social policy analysis. This paper tries to examine social policies towards the application of large-scale social restrictions on mosques and markets. In this paper, the sociology of law theory is used, namely Law is a social engineering tool which emphasizes that law becomes the commander who must bring change to society. The results obtained in the research are that the community responds to the large-scale social restriction policy differently, where the purpose of the policy is for the community to be expected to make changes by complying with the rules that have been set by the government, the conditions for rejection and various responses are caused by disharmony between implementation of policies with public awareness of the law.Keyword : Policy, large-Scale Restrictions and the sociology of law. AbstrakIslam sebagai agama mengkhendaki umatnya agar senantiasa menjaga keseimbangan antara religiusitas (al din) dan masalah keduniaan (al dunia). Hubungan keduanya menggambarkan sesuatu yang terpisah namun tidak bisa dipisahkan (harmoni). Namun bagi masyarakat modern kondisi tersebut seringkali justru menimbulkan pertentangan, kondisi tersebut nampak pada saat terjadinya pandemi Covid 19. Penerapan Pembatasan Sosial Berskala Besar oleh pemerintah dalam upaya penanggulangan penyebaran dampak Covid 19 kepada masyarakat dengan membatasi aktivitas di masjid dan membiarkan kegiatan di pasar tetap berjalan nyatanya direspon oleh masyarakat secara berbeda. Metodologi yang digunakan adalah kualitatif dengan menggunakan analisis kebijakan sosial, Tulisan ini mencoba menelaah kebijakan sosial terhadap penerapan pembatasan sosial berskala besar terhadap masjid dan pasar. Dalam penulisan ini dipergunakan teori sosiologi hukum yaitu Law is a tool social engineering yang menegaskan bahwa hukum menjadi panglima yang harus membawa perubahan terhadap masyarakat. Hasil yang diperoleh dalam penelitian adalah Masyarakat merespon kebijakan pembatasan sosial berskala besar tersebut secara berbeda, dimana tujuan kebijakan tersebut adalah untuk masyarakat diharapkan dapat melakukan perubahan dengan mematuhi aturan yang telah di tetapkan oleh pemerintah, kondisi penolakan dan respon beragam tersebut di sebabkan oleh ketidak harmonisannya antara penerapan kebijakan dengan kesadaran masyarakat terhadap hukum.Kata Kunci : Kebijakan,  Pembatasan Sosial Berskala Besar dan Sosiologi Hukum


Author(s):  
Nasim Talebi ◽  
Emmanuel Ayaburi ◽  
Suhail Chakravarty

Driven by the difficulty in achieving complete security with technical tools, business investigators are looking into organizational and behavioral issues that could help make systems more secure. This chapter looks at the security of systems from the organizational perspective. Specifically, this study attempts to identify if different organizations have different predisposition to particular type(s) of security threat sources. Using publicly available security breach data from a privacy rights clearinghouse to investigate which organizational characteristics predisposes an institution to an external or internal threat source, it was concluded that as size of organization and the number of its valuable documents increase by one unit, the organization's probability of suffering an internal attacks decrease. Furthermore, when executive members have a business degree rather than information-security-related degrees, the likelihood of suffering an internal attack increases. Also, the probability of an organization suffering an internal or external attack is not based on its industry type.


Author(s):  
H. Yarovenko

Over the past decade, there has been an increase in the volume of cybercrime in various spheres of life at the level of the state, economic agents, and individuals. Therefore, the issues of studying the processes of forming information security and identifying the impact on its effectiveness are becoming topical. The aim of this study is to prove the hypothesis that the behaviour of the population associated with the use of personal security measures and the formation of the corresponding consequences of incidents occurs under the influence of the level of economic development of the country. This was done using k-means cluster analysis via the Deductor Academic analytical platform and based on data from a survey conducted among respondents from EU countries. Analysis of the responses showed that there is a growing trend in the use of online banking and e-commerce services; there is an increase in the number of respondents who have become victims of cybercrimes, especially social engineering; the trend towards the use of reliable personal security equipment is declining. The results of the cluster analysis, for which data on the number of respondents who are victims of cybercrimes and the number of respondents using various personal security tools were used, made it possible to form 7 clusters of countries. Analysis of GDP per capita for the obtained clusters and visualization of the map of countries allowed us to confirm the hypothesis, but it was also determined that the dependence of the use of personal security measures and the consequences of cybercrimes is also influenced by the mental characteristics of countries formed due to the close territorial location of neighboring countries. The results obtained will be of practical importance for the development of the concept of information security and economic development of the state. They can be used to determine which sets of protection are appropriate for the income level of the population. Priority areas for further research are to determine the influence of other factors on the formation of the country's information security and the formation of a barycentric model of their measurements to ensure sustainable economic development of the state.


Sign in / Sign up

Export Citation Format

Share Document