期刊文献+

社会工程学背景下的网络安全 被引量:4

Network Security under the Background of Social Engineering
下载PDF
导出
摘要 网络的发展使社会工程学攻击呈迅速上升甚至滥用的趋势.这种攻击利用了人的弱点而非计算机系统漏洞来突破信息安全防御措施,因此,研究它对网络安全的威胁有着积极的意义.本文对社会工程学进行原理性分析,描述了社会工程学与网络安全的关系和社会工程学攻击的特征及方法,阐述了社会工程学攻击将心理的和行为的攻击结合运用的过程,指出将社会工程学融入到蜜罐系统,构建更加全面的安全防护体系,以抵御各种技术与非技术因素的攻击,是一种新的思路. As network evolves, social engineering attack has a rapidly rising even trend of abuse. It is of significance to study the threats of the attack on network security, because this attack breaks through the defense measures of system security by using human vulnerability not computer leaks. This paper discusses about the theoretical basis of social engineering and social engineering attack, describes the relation of social engineering and network security and the character and method of this attack, and then expounds the attack's process with psychological and behavioral attack. In order to develop the general system of network security for defending all kinds of technical and non - technical factor attacks, social engineering should integrate with honeypot system. That is a new idea pointed out in this article.
出处 《怀化学院学报》 2013年第5期52-56,共5页 Journal of Huaihua University
基金 湖南省教育厅科研项目(No.10C1064) 怀化学院科研项目(No.HHUY2010-18) 怀化学院重点学科建设项目资助
关键词 社会工程学 网络安全 防御体系 攻击 蜜罐系统 social engineering network security defense system attack honeypot system
  • 相关文献

参考文献28

  • 1杨勇.瑞星2012年上半年中国信息安全报告[EB/OL].http://www.rising.coin.cn/about/news/risising/2012-07-09/11877-4.html.2012-07-09.
  • 2Keith DeBus. What is Cyber Warfare [ EB/OL]. First published in Hakin9. http: //www. itseeuritas, net/cyber- warfare. 2012- 11 - 13.
  • 3李欲晓.云计算大数据时代个人隐私保护刻不容缓[EB/OL].http://guancha.gmw.cn/2012-12/20/content6080691.htm.2012-12-20.
  • 4Mosin Hasan, Nilesh Prajapati, Safvan Vohara. Case Study On Social Engineering Techniques for Persuasion [ J]. International Journal on Applications of Graph Theory in Wireless ad hoc Networks and Sensor Networks, 2010, 2 (2) : 18 - 25.
  • 5Richard G. Brody, William B. Brizzee, Lewis Cano. Flying under the radar: social engineering [J]. International Journal of Accounting and Information Management, 2012, 20 ( 4 ) : 335 - 347.
  • 6Xin Luo, Richard Brody, Alessandro Seazzu, et al. Social Engineering: The Neglected Human Factor for Information Security Management [ J ]. Information Resources Management Journal, 2011, 24 (3): 1-8.
  • 7李黎明.社会工程学:一种新的知识探险[J].西安交通大学学报(社会科学版),2006,26(1):18-24. 被引量:18
  • 8Mitniek, Kevin D. Simon, William L. The Art Of Deception [M] . John Wiley & Sons Inc, 2005.
  • 9余星辰,张俊.社会工程学应用于公安追逃工作初探[J].湖北警官学院学报,2012,25(3):158-160. 被引量:3
  • 10秦溢博.瑞星2011年度安全报告[EB/OL].http://www.rising.com.on/about/news/rising/2012-01-11/10776.4.html.2012-01-11.

二级参考文献26

共引文献72

同被引文献26

  • 1范刚.刑事一体化与犯罪心理学的研究[J].兰州大学学报(社会科学版),2006,34(3):120-124. 被引量:6
  • 2Duncan J. Watts, Peter Sheridan Dodds. lnfluentials, Networks, and Public Opinion Formation [ C ]. Journal of Consumer Re- search Publication Info,2007:441-458.
  • 3Correa C D, Ma K L. Visualizing Social Networks[ M]. Social Network Data Analyfics. Springer US, 2011 : 307-326.
  • 4Mika P. Flink: Semantic Web Technology for the Extraction and Analysis of Social Networks. Web Semantics: Science [ J ]. Serv- ices and Agents on the World Wide Web, 2005,3 ( 2 ) : 211 - 223.
  • 5包胜华.智能社交准确感知你情绪的人工智能[R].技术动态,2015(220).
  • 6余星辰.PSE舆情雷达图分析导控助力公安梦[C].警学理论研究成果汇编,2013:169-179.
  • 7Lin Yun,Wang Jie,Zou Rong. An Improved Naive Bayes Classi- fier Method in Public Opinion Analysis [ C ]. Proceedings of the 4th International Conference on Computer Engineering and Net- works,2015:219-225.
  • 8Zhang Y, Luan Y F, DU Wei. Design and Implementation of Management Module in Public Opinion Analysis and Control System [ R ]. Computer Knowledge & Technology,2013.
  • 9Kolda T, Brown D, Corones J. Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery[ R]. DHS Workshop on Data Sciences,2004.
  • 10韩臻.信息安全工作需关注心理学的研究及应用[J].信息安全与通信保密,2010,7(1):57-60. 被引量:3

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部