Publikace UTB
Repozitář publikační činnosti UTB

Cyberterrorism and social engineering - Methods and countermeasures

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Cyberterrorism and social engineering - Methods and countermeasures en
dc.contributor.author Kotková, Barbora
dc.contributor.author Blahová, Marta
dc.relation.ispartof International Multidisciplinary Scientific GeoConference Surveying Geology and Mining Ecology Management, SGEM
dc.identifier.issn 1314-2704 Scopus Sources, Sherpa/RoMEO, JCR
dc.identifier.isbn 978-619-7603-61-3
dc.date.issued 2023
utb.relation.volume 23
utb.relation.issue 2.1
dc.citation.spage 57
dc.citation.epage 64
dc.event.title 23rd International Multidisciplinary Scientific Geoconference: Informatics, Geoinformatics and Remote Sensing, SGEM 2023
dc.event.location Albena
utb.event.state-en Bulgaria
utb.event.state-cs Bulharsko
dc.event.sdate 2023-07-03
dc.event.edate 2023-07-09
dc.type conferenceObject
dc.language.iso en
dc.publisher International Multidisciplinary Scientific Geoconference
dc.identifier.doi 10.5593/sgem2023/2.1/s07.08
dc.relation.uri https://epslibrary.at/sgem_jresearch_publication_view.php?page=view&editid1=9088
dc.subject cyberterrorism en
dc.subject hacker en
dc.subject network security en
dc.subject network threats en
dc.subject sniffing en
dc.description.abstract The article deals with the topic of cyberterrorism committed with the help of social engineering. It lists the means and methods used by modern cyber-terrorists but mentions in more detail the less common ones, which have a greater chance of success because they are not widely known. In the case of cyber terrorism or cyber war, the damage can become global. It is in the existential interest of every state or company to have a sufficient level of prevention against threats to its digital space and adequate settings of functional countermeasures. The article mentions these current countermeasures, especially the selected ones that correspond to the results of the SWOT analysis presented here. The topics of cybercrime include criminally punishable harmful behavior on the Internet such as Internet piracy (making illegal copies, illegal Peer-to-Peer file sharing, violation of copyright or industrial rights), dissemination of harmful content, a serious form of cyberbullying, cyber grooming, and cyberstalking. At present, especially the enormously increasing sophisticated organized crime, identity theft, or cyber-terrorism. From a general introduction to a better understanding of the topic, it goes on to a detailed description of individual current methods and focuses on the most frequently used techniques and methods of today like Watering Hole Attack, Cryptojacking, Pivoting, Credential Stuffing Attack, Website Defacement and Formjacking for example. In particular, social engineering methods, DDoS attacks, and password-cracking methods are described. Using an overview SWOT analysis, the article points out strengths and weaknesses, threats and opportunities concerning the currently most used methods of criminals. In conclusion, it presents the current requirements and measures, due to the constantly more sophisticated methods of modern attacks, for a secure organization and offers recommended procedures. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1011774
utb.identifier.obdid 43885234
utb.identifier.scopus 2-s2.0-85177874117
utb.source d-scopus
dc.date.accessioned 2024-02-02T10:29:27Z
dc.date.available 2024-02-02T10:29:27Z
dc.description.sponsorship Institute of Safety Engineering, Faculty of Applied Informatics; Univerzita Tomáše Bati ve Zlíně, UTB, (IGA / FAI / 2023/004)
utb.contributor.internalauthor Kotková, Barbora
utb.contributor.internalauthor Blahová, Marta
utb.fulltext.references [1] VEGRICHTOVA, Barbora. The threat of radicalization: terrorism, warning signs and protection companies. Prague: Grada, 2019. ISBN 978-802-7120-314. [2] BRZYBOHATÝ, Marian. Terorismus I. Praha: Police History, 1999. ISBN 80-902670-1-7. [3] National Cyber Security Index 2018: Methodology [online]. Tallinn: e-Governance Academy Rotermanni 8, 10111 Tallinn ega.ee, 2018 [cit. 13. 12. 2021]. [4] JUKL, Marek. Medical instructor of the Czech Red Cross. 2 edit. ed. [online]. Prague:Office of the Czech Red Cross, 2006. [cit. 03/01/2022]. ISBN 802544547X. [5] Al-Fateh – The Hamas Web Magazine for Children: Indoctrination to Jihad, Annihilation and Self-Destruction [online]. Institute for Monitoring Peace and Cultural Tolerance in School Education, 2009. [cit. 15. 11. 2021]. [6] Why the U.S. Shouldn’t Play Games With Cyberwarfare as Its Power Declines [online]. [cit. 03.01. 2022]. [7] Terrorism: Modern terrorist methods. Ministry of the Interior of the Czech Republic [online]. [feeling. 01.11. 2021]. [8] KOTKOVÁ, Barbora a Martin HROMADA. The analysis of cyber attacks on energy systems in the world. In: International Multidisciplinary Scientific GeoConference Surveying Geology and Mining Ecology Management, SGEM [online]. Varna: International Multidisciplinary Scientific Geoconference, 2021, s. 51-58. [cit. 2023-06-15]. ISSN 1314-2704.
utb.fulltext.sponsorship This research was based on the support of the Internal Grant Agency of Tomas Bata University in Zlín, the IGA/FAI/2023/004 project and the Institute of Safety Engineering, Faculty of Applied Informatics.
utb.scopus.affiliation Tomas Bata University in Zlín, Faculty of Applied Informatics, Zlín, Czech Republic
utb.fulltext.projects IGA/FAI/2023/004
Find Full text

Soubory tohoto záznamu

Soubory Velikost Formát Zobrazit

K tomuto záznamu nejsou připojeny žádné soubory.

Zobrazit minimální záznam