+7 925 966 4690, 9am6pm (GMT+3), Monday – Friday
ИД «Финансы и кредит»

JOURNALS

  

FOR AUTHORS

  

SUBSCRIBE

    
National Interests: Priorities and Security
 

Social engineering as a threat to personal financial security

Vol. 17, Iss. 1, JANUARY 2021

Received: 26 October 2020

Received in revised form: 13 November 2020

Accepted: 30 November 2020

Available online: 14 January 2021

Subject Heading: THREATS AND SECURITY

JEL Classification: F52, H56, J28, M15, N10

Pages: 150–166

https://doi.org/10.24891/ni.17.1.150

Andrei L. LOMAKIN Russian Presidential Academy of National Economy and Public Administration (RANEPA), Moscow, Russian Federation
lomakin-al@ranepa.ru

ORCID id: not available

Evgenii Yu. KHRUSTALEV Central Economics and Mathematics Institute, Russian Academy of Sciences (CEMI RAS), Moscow, Russian Federation
stalev777@yandex.ru

ORCID id: not available

Gleb A. KOSTYURIN Russian Presidential Academy of National Economy and Public Administration (RANEPA), Moscow, Russian Federation
g.kostyurin@yandex.ru

ORCID id: not available

Subject. As the socio-economic relationships are getting digitalized so quickly, the society faces more and more instances of cybercrime. To effectively prevent arising threats to personal information security, it is necessary to know key social engineering methods and security activities to mitigate consequences of emerging threats.
Objectives. We herein analyze and detect arising information security threats associated with social engineering. We set forth basic guidelines for preventing threats and improving the personal security from social engineering approaches.
Methods. The study relies upon methods of systems analysis, synthesis, analogy and generalization.
Results. We determined the most frequent instances associated with social engineering, which cause personal information security threats and possible implications. The article outlines guidelines for improving the persona; security from social engineering approaches as an information security threat.
Conclusions and Relevance. To make information security threats associated with social engineering less probable, there should be a comprehensive approach implying two strategies. First, the information security protection should be technologically improved, fitted with various data protection, antivirus, anti-fishing software. Second, people should be more aware of information security issues. Raising the public awareness, the government, heads of various departments, top executives of public and private organizations should set an integrated training system for people, civil servants, employees to proliferate the knowledge of information security basics.

Keywords: social engineering, information security, cyber threats

References:

  1. Khrustalev E.Yu., Kostyurin G.A. [Cyber threats: Triggers and prevention recommendations]. Natsional'nye interesy: prioritety i bezopasnost' = National Interests: Priorities and Security, 2019, vol. 15, iss. 6, pp. 1185–1194. (In Russ.) URL: Link
  2. Bobylev A.E., Trofimova A.V. [Data protection problem on the Internet of things]. Nauka-Rastudent.ru, 2016, no. 3, p. 25. (In Russ.) URL: Link
  3. Gol'chevskii Yu.V., Filimonova N.A. [Approach to detecting malicious activity on the Internet of things]. Informatsiya i bezopasnost' = Information and Security, 2017, vol. 20, no. 3, pp. 464–467. (In Russ.)
  4. Semenova K.D., Tarasova K.I. Statistical Research of Global Cyber-risks: The Cost of Cyber-crime. In: Topical Questions of Contemporary Science Collection of Scientific Articles. Aspekt Publishing, 2017, pp. 315–320. URL: Link
  5. Vyatkin A.A. [The Economic Security of Electronic Payment Systems: Reducing Cyber Risks in the Conditions of Digital Transformation]. Innovatsionnoe razvitie ekonomiki = Innovative Development of Economy, 2018, no. 5, pp. 295–298. (In Russ.)
  6. Alosaimi R., Alnuem M. Risk Management Frameworks for Cloud Computing: A Critical Review. International Journal of Computer Science & Information Technology, 2016, vol. 8, iss. 4, pp. 1–11. URL: Link
  7. Andreev N.O. [Formation and development of threats in information systems]. Prikladnaya informatika = Applied Informatics, 2006, no. 6, pp. 87–100. URL: Link (In Russ.)
  8. Turygina V.F., Ford V.F., Matvevnina A.I. [The use of machine learning in cyber security]. Nauchnyi al'manakh = Scientific Almanac, 2017, no. 6-1, pp. 405–408. (In Russ.)
  9. Glotina I.M. [Cybercrime as shadow business]. Vestnik Chelyabinskogo gosudarstvennogo universiteta = Bulletin of Chelyabinsk State University, 2016, no. 6, pp. 51–57. URL: Link (In Russ.)
  10. Belova I.V. [Formulating the concept of information security in the curriculum of Fundamentals of information security]. Psikhologiya, sotsiologiya i pedagogika = Psychology, Sociology and Pedagogy, 2011, no. 3. (In Russ.) URL: Link
  11. Kadulin V.E., Klochkova E.N. [The relation between the concepts of information security and cyber security in the contemporary legal environment]. Voprosy kiberbezopasnosti = Cybersecurity Issues, 2017, no. S2, pp. 7–10. (In Russ.)
  12. Alpeev A.S. [Terminology of insecurity: Cybersecurity, information security]. Voprosy kiberbezopasnosti = Cybersecurity Issues, 2014, no. 5, pp. 39–42. URL: Link (In Russ.)
  13. Gavrilova E.A. [Research methods for detecting network attacks]. Nauchnye zapiski molodykh issledovatelei = Scientific Notes of Young Scientists, 2017, no. 4, pp. 55–58. URL: Link (In Russ.)

View all articles of issue

 

ISSN 2311-875X (Online)
ISSN 2073-2872 (Print)

Journal current issue

Vol. 20, Iss. 2
February 2024

Archive