+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

articles

The author: Tumbinskaya M. V.     Published in № 3(69) 30 june 2017 year
Rubric: Data protection

Protection of information in social networks from the social engineer attacks of the attacker

Nowadays, users of social networks (Social Network) are increasingly using them to promote businesses, distribute advertisements for goods and services, leisure, hobbies, personal communication and information exchange, thus being an open source of information for intruders. Attackers use various ways to implement attacks, one of which is the dissemination of targeted information. Successful distribution of targeted (unwanted) information entails the implementation of the attack scenario and the achievement of the target of the attacker. In this regard, the attackers have an interest in involving the so-called social networking community leaders (users who have a high level of trust, influence among a large number of community users) who are able to successfully implement a part of the attack scenario of the attacker. The article attempts to formalize a generalized algorithm for the distribution of targeted information in social networks: a set of initial data and the results of the algorithm work are presented — parameters for implementing attack scenarios, the variation of which will allow it to be detailed. The technique of protection from the targeted information distributed in social networks is offered, which will allow to increase the level of protection of personal data and personal information of users of social networks, reliability of information. The results of the research will help to prevent threats to information security, to counteract attacks by intruders who often use competitive intelligence and social engineering methods by applying countermeasures, develop a model of protection against targeted information and, on its basis, implement special software for integration into virtual social networks.

Key words

information security, social information system Social Network, targeted information, the attacker, the attack scenario.

The author:

Tumbinskaya M. V.

Degree:

Cand. Sci. (Tech.), Assоciate Prоfessоr, Department оf Infоrmatiоn Prоtectiоn Systems, Kazan Natiоnal Research Technical University named after A. N. Tupоlev

Location:

Kazan