Kontaktujte nás | Jazyk: čeština English
dc.title | Cyberterrorism and social engineering - Methods and countermeasures | en |
dc.contributor.author | Kotková, Barbora | |
dc.contributor.author | Blahová, Marta | |
dc.relation.ispartof | International Multidisciplinary Scientific GeoConference Surveying Geology and Mining Ecology Management, SGEM | |
dc.identifier.issn | 1314-2704 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.identifier.isbn | 978-619-7603-61-3 | |
dc.date.issued | 2023 | |
utb.relation.volume | 23 | |
utb.relation.issue | 2.1 | |
dc.citation.spage | 57 | |
dc.citation.epage | 64 | |
dc.event.title | 23rd International Multidisciplinary Scientific Geoconference: Informatics, Geoinformatics and Remote Sensing, SGEM 2023 | |
dc.event.location | Albena | |
utb.event.state-en | Bulgaria | |
utb.event.state-cs | Bulharsko | |
dc.event.sdate | 2023-07-03 | |
dc.event.edate | 2023-07-09 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | International Multidisciplinary Scientific Geoconference | |
dc.identifier.doi | 10.5593/sgem2023/2.1/s07.08 | |
dc.relation.uri | https://epslibrary.at/sgem_jresearch_publication_view.php?page=view&editid1=9088 | |
dc.subject | cyberterrorism | en |
dc.subject | hacker | en |
dc.subject | network security | en |
dc.subject | network threats | en |
dc.subject | sniffing | en |
dc.description.abstract | The article deals with the topic of cyberterrorism committed with the help of social engineering. It lists the means and methods used by modern cyber-terrorists but mentions in more detail the less common ones, which have a greater chance of success because they are not widely known. In the case of cyber terrorism or cyber war, the damage can become global. It is in the existential interest of every state or company to have a sufficient level of prevention against threats to its digital space and adequate settings of functional countermeasures. The article mentions these current countermeasures, especially the selected ones that correspond to the results of the SWOT analysis presented here. The topics of cybercrime include criminally punishable harmful behavior on the Internet such as Internet piracy (making illegal copies, illegal Peer-to-Peer file sharing, violation of copyright or industrial rights), dissemination of harmful content, a serious form of cyberbullying, cyber grooming, and cyberstalking. At present, especially the enormously increasing sophisticated organized crime, identity theft, or cyber-terrorism. From a general introduction to a better understanding of the topic, it goes on to a detailed description of individual current methods and focuses on the most frequently used techniques and methods of today like Watering Hole Attack, Cryptojacking, Pivoting, Credential Stuffing Attack, Website Defacement and Formjacking for example. In particular, social engineering methods, DDoS attacks, and password-cracking methods are described. Using an overview SWOT analysis, the article points out strengths and weaknesses, threats and opportunities concerning the currently most used methods of criminals. In conclusion, it presents the current requirements and measures, due to the constantly more sophisticated methods of modern attacks, for a secure organization and offers recommended procedures. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1011774 | |
utb.identifier.obdid | 43885234 | |
utb.identifier.scopus | 2-s2.0-85177874117 | |
utb.source | d-scopus | |
dc.date.accessioned | 2024-02-02T10:29:27Z | |
dc.date.available | 2024-02-02T10:29:27Z | |
dc.description.sponsorship | Institute of Safety Engineering, Faculty of Applied Informatics; Univerzita Tomáše Bati ve Zlíně, UTB, (IGA / FAI / 2023/004) | |
utb.contributor.internalauthor | Kotková, Barbora | |
utb.contributor.internalauthor | Blahová, Marta | |
utb.fulltext.references | [1] VEGRICHTOVA, Barbora. The threat of radicalization: terrorism, warning signs and protection companies. Prague: Grada, 2019. ISBN 978-802-7120-314. [2] BRZYBOHATÝ, Marian. Terorismus I. Praha: Police History, 1999. ISBN 80-902670-1-7. [3] National Cyber Security Index 2018: Methodology [online]. Tallinn: e-Governance Academy Rotermanni 8, 10111 Tallinn ega.ee, 2018 [cit. 13. 12. 2021]. [4] JUKL, Marek. Medical instructor of the Czech Red Cross. 2 edit. ed. [online]. Prague:Office of the Czech Red Cross, 2006. [cit. 03/01/2022]. ISBN 802544547X. [5] Al-Fateh – The Hamas Web Magazine for Children: Indoctrination to Jihad, Annihilation and Self-Destruction [online]. Institute for Monitoring Peace and Cultural Tolerance in School Education, 2009. [cit. 15. 11. 2021]. [6] Why the U.S. Shouldn’t Play Games With Cyberwarfare as Its Power Declines [online]. [cit. 03.01. 2022]. [7] Terrorism: Modern terrorist methods. Ministry of the Interior of the Czech Republic [online]. [feeling. 01.11. 2021]. [8] KOTKOVÁ, Barbora a Martin HROMADA. The analysis of cyber attacks on energy systems in the world. In: International Multidisciplinary Scientific GeoConference Surveying Geology and Mining Ecology Management, SGEM [online]. Varna: International Multidisciplinary Scientific Geoconference, 2021, s. 51-58. [cit. 2023-06-15]. ISSN 1314-2704. | |
utb.fulltext.sponsorship | This research was based on the support of the Internal Grant Agency of Tomas Bata University in Zlín, the IGA/FAI/2023/004 project and the Institute of Safety Engineering, Faculty of Applied Informatics. | |
utb.scopus.affiliation | Tomas Bata University in Zlín, Faculty of Applied Informatics, Zlín, Czech Republic | |
utb.fulltext.projects | IGA/FAI/2023/004 |
Soubory | Velikost | Formát | Zobrazit |
---|---|---|---|
K tomuto záznamu nejsou připojeny žádné soubory. |