Publikace UTB
Repozitář publikační činnosti UTB

Cyber security and social engineering

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Cyber security and social engineering en
dc.contributor.author Kotková, Barbora
dc.contributor.author Hromada, Martin
dc.relation.ispartof Proceedings - 25th International Conference on Circuits, Systems, Communications and Computers, CSCC 2021
dc.identifier.isbn 978-1-66542-749-4
dc.date.issued 2021
dc.citation.spage 134
dc.citation.epage 140
dc.event.title 25th International Conference on Circuits, Systems, Communications and Computers, CSCC 2021
dc.event.location Crete Island
utb.event.state-en Greece
utb.event.state-cs Řecko
dc.event.sdate 2021-07-19
dc.event.edate 2021-07-22
dc.type conferenceObject
dc.language.iso en
dc.publisher Institute of Electrical and Electronics Engineers Inc.
dc.identifier.doi 10.1109/CSCC53858.2021.00031
dc.relation.uri https://ieeexplore.ieee.org/document/9668708
dc.subject social engineering en
dc.subject scamming en
dc.subject cyber-security en
dc.subject sensitive personal information en
dc.subject cyber attack en
dc.subject hazard en
dc.subject defense en
dc.subject data abuse en
dc.description.abstract Nowadays, it is quite common to use modern information technology at work, at school and in private life. Shared information can be used not only for advertising and statistics purposes. Low levels of awareness, inattention and trust can lead to the misuse of this information, using computers and smart mobile devices using the Internet. This article aims to summarize in the introduction the most common methods used to misuse information and what user behavior leads to this. Furthermore, the article then describes the purpose for which this information is misused. The conclusion then describes the methods of protection. It is necessary to constantly draw attention to this issue so that users themselves focus on information security in the environment of information and communication technologies. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1010868
utb.identifier.obdid 43883189
utb.identifier.scopus 2-s2.0-85125008962
utb.identifier.wok 000848667100022
utb.source d-scopus
dc.date.accessioned 2022-03-11T08:48:28Z
dc.date.available 2022-03-11T08:48:28Z
dc.description.sponsorship Univerzita Tomáše Bati ve Zlíně: IGA/FAI/2021/002
dc.description.sponsorship Internal Grant Agency of Tomas Bata University in Zlin; Institute of Safety Engineering, Faculty of Applied Informatics; [IGA/FAI/2021/002]
utb.contributor.internalauthor Kotková, Barbora
utb.contributor.internalauthor Hromada, Martin
utb.fulltext.affiliation Barbora Kotkova Tomas Bata University in Zlín Zlin, Czech Republic b_kotkova@utb.cz Martin Hromada Tomas Bata University in Zlín Zlin, Czech Republic hromada@utb.cz
utb.fulltext.dates -
utb.fulltext.references [1] Where are the boundaries of ethical hacking? https://www.systemonline.cz/it-security/kde-jsou-hranice-etickehohackingu.htm [2] KUCHTA, Josef. Current problems of cybercrime, including its prevention. Journal for legal science and practice. [Online]. 2016, No. 1, pp. 5-19. [feeling. 2021-05-01]. [3] Government Proposal No. 28 of the Senate of the Czech Republic of 2013 to express consent to ratification, https://www.senat.cz/xqw/xervlet/pssenat [4] MATEJKA, Ján. The Internet as an object of law: seeking a balance between autonomy and privac, ISBN 978-80-904248-7-6. [5] JANSA, Lukáš et al. Internet law. 1st edition Brno: Computer Press, 2016. ISBN 978-80-251-4664-4. [6] DONÁT, Josef and Jan TOMÍŠEK. Network Law: A Guide to Internet Law. 1st ed. Prague: C.H. Beck, 2016. ISBN 978-80-7400-610-4. [7] JIROVSKÝ, Václav. Cybercrime: not just about hacking, cracking, viruses and Trojans without secrets. 1st ed. Prague: Grada, 2007. ISBN 978-80-247-1561-2. [8] PĚNČÍK, Lukáš. Current trends in cybercrime and computer data security. [online]. Brno, 2020 [cit. 2021-04-30]. [9] JANSA, Lukáš et al. Internet law, 2020, Computer Press, ISBN 978-80-2514-664-4. [10] KOLOUCH, Jan. CyberCrime, 2017, CZ.NIC, ISBN 978-80-88168-15-7. [11] Quora. [online]. How does Bayesian spam filtering work ?. [Feeling. 02/02/2018]. Available from: https://www.quora.com/How-doesBayesian-spam-filtering-work [12] https://www.knowbe4.com/hubfs/SecurityAwarenessTrainingDeploymentsDeterDefeatHackers.pdf [13] ROZMAROVA, Monika. Risks of misuse of private information in the Internet environment [online]. Brno, 2018 [cit. 2021-04-30]. [14] Statistics on resolved incidents. CSIRT [online]. Czech Republic [cit. 6/25/2020]. Available from: <https://csirt.cz/cs/o-nas/statistiky/>. [15] NETOLIČKA, Jan. \ textit {Scamming: Techniques of obtaining sensitive data in the online environment} [online]. Brno, 2020 [cit. 2021-04-30]. [16] www.policie.cz [17] Act No. 181/2014 Coll. Laws for people [online]. Czech Republic [cit. 6/23/2020]. [18] Roumen Trifonov, Slavcho Manolov, Georgi Tsochev, Galya Pavlova, Automation of Cyber Security Incident Handling Incident through Artificial Intelligence Methods, WSEAS Transaction on Computers, ISSN / E-ISSN: 1109-2750 / 2224-2872
utb.fulltext.sponsorship This research was based on the support of the Internal Grant Agency of Tomas Bata University in Zlín, the IGA / FAI / 2021/002 project and the Institute of Safety Engineering, Faculty of Applied Informatics.
utb.wos.affiliation [Kotkova, Barbora; Hromada, Martin] Tomas Bata Univ Zlin, Zlin, Czech Republic
utb.scopus.affiliation Tomas Bata University in Zlín, Zlin, Czech Republic
utb.fulltext.projects IGA/FAI/2021/002
utb.fulltext.faculty -
utb.fulltext.ou -
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam