{"title":"Human psychological and biometric factor in the development and use of social engineering methods in peacetime and wartime","authors":"M. I. Ganchenko","doi":"10.31673/2409-7292.2022.011626","DOIUrl":null,"url":null,"abstract":"The subject of this article is the process of influence of social engineers on people by manipulating consciousness, emotions, feelings without and with the use of modern information technology processing and simulation of biological characteristics of mankind in peacetime and wartime. The purpose and objectives are: consideration of existing methods of social engineering such as phishing, trojan, pretexting, watering hole, betting, quid pro quo, persecution, reverse social engineering through the prism of human feelings: naivety, inattention, greed, gullibility, curiosity, belonging fear; Consideration of modern technologies: handwriting forgery - My Text in your Handwriting algorithm, voice substitution - Descript's Ovrlab service, artificial dialogue - Replika application and face replacement - Deep Fake technology, which can help fraudsters to achieve their own goals of obtaining confidential data and carrying out further attacks based on them, as well as manipulating the consciousness of the real perception of events in wartime. The methods used are: psychological and sociological research methods, such as observation, social engineering methods, forecasting methods based on analysis and conclusions about future trends. The following results were obtained. Associations of methods of social engineering with feelings to which this or that psychological influence of the social engineer is directed are created. The potential of using emerging technologies with social engineering techniques to carry out more effective and sophisticated attacks, taking into account the favorite effects of criminals: haste, surprise, confusion, feelings of pity, anxiety, excitement and so on. The possibility of threats related to the procedures of authentication and authorization of users of biometric data on the basis of the considered modern technologies of imitation of biometric data of mankind: handwriting, voice, face. The scientific novelty of the research results is as follows: the importance and necessity of careful treatment of confidential information that people disseminate about themselves in all aspects of their social life; identified the main feelings on which social engineers play to achieve their own goals and benefit; the potential of development of modern technologies of imitation of biometric data of people in efficiency of carrying out attacks by methods of social engineering is specified, efficiency of use of means and methods of social engineering during information wars for influence on unstable psychological state is proved.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2022.011626","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The subject of this article is the process of influence of social engineers on people by manipulating consciousness, emotions, feelings without and with the use of modern information technology processing and simulation of biological characteristics of mankind in peacetime and wartime. The purpose and objectives are: consideration of existing methods of social engineering such as phishing, trojan, pretexting, watering hole, betting, quid pro quo, persecution, reverse social engineering through the prism of human feelings: naivety, inattention, greed, gullibility, curiosity, belonging fear; Consideration of modern technologies: handwriting forgery - My Text in your Handwriting algorithm, voice substitution - Descript's Ovrlab service, artificial dialogue - Replika application and face replacement - Deep Fake technology, which can help fraudsters to achieve their own goals of obtaining confidential data and carrying out further attacks based on them, as well as manipulating the consciousness of the real perception of events in wartime. The methods used are: psychological and sociological research methods, such as observation, social engineering methods, forecasting methods based on analysis and conclusions about future trends. The following results were obtained. Associations of methods of social engineering with feelings to which this or that psychological influence of the social engineer is directed are created. The potential of using emerging technologies with social engineering techniques to carry out more effective and sophisticated attacks, taking into account the favorite effects of criminals: haste, surprise, confusion, feelings of pity, anxiety, excitement and so on. The possibility of threats related to the procedures of authentication and authorization of users of biometric data on the basis of the considered modern technologies of imitation of biometric data of mankind: handwriting, voice, face. The scientific novelty of the research results is as follows: the importance and necessity of careful treatment of confidential information that people disseminate about themselves in all aspects of their social life; identified the main feelings on which social engineers play to achieve their own goals and benefit; the potential of development of modern technologies of imitation of biometric data of people in efficiency of carrying out attacks by methods of social engineering is specified, efficiency of use of means and methods of social engineering during information wars for influence on unstable psychological state is proved.
本文的主题是社会工程师在和平时期和战争时期利用现代信息技术处理和模拟人类的生物特征,通过操纵人们的意识、情绪、感情来影响人们的过程。目的和目标是:考虑现有的社会工程方法,如网络钓鱼、特洛伊木马、借口、水坑、赌博、交换条件、迫害,通过人类情感的棱镜进行逆向社会工程:天真、不注意、贪婪、轻信、好奇、归属恐惧;考虑到现代技术:手写伪造- My Text in your handwriting算法,语音替代- describe的Ovrlab服务,人工对话- Replika应用和面部替换- Deep Fake技术,可以帮助欺诈者实现自己的目标,获取机密数据并在此基础上进行进一步的攻击,以及操纵战时事件真实感知的意识。使用的方法有:心理学和社会学研究方法,如观察法、社会工程方法、基于分析和结论的预测方法。得到了以下结果:社会工程的方法与社会工程师的这种或那种心理影响所指向的感觉联系起来。利用新兴技术和社会工程技术进行更有效、更复杂的攻击的潜力,考虑到罪犯最喜欢的效果:匆忙、惊讶、困惑、怜悯、焦虑、兴奋等等。威胁的可能性与生物特征数据用户的认证和授权程序有关,这些程序基于被认为是模仿人类生物特征数据的现代技术:手写、声音、面部。研究结果的科学新颖性体现在:人们在社会生活的各个方面传播的关于自己的保密信息,谨慎处理的重要性和必要性;确定社会工程师为实现自己的目标和利益而发挥的主要感受;指出了现代模仿人的生物特征数据技术在利用社会工程方法实施攻击效率方面的发展潜力,证明了在信息战中利用社会工程手段和方法影响不稳定心理状态的效率。