{"title":"企业社会工程攻击仿真模型","authors":"Francis Lowu, Hudson Nandere","doi":"10.7176/jiea/11-2-10","DOIUrl":null,"url":null,"abstract":"The pervasive use of social media in small and medium enterprises has increased social engineering cyber-attacks. Enterprises that have adopted the use of social media and emails to supplement on their marketing to complete business deals have been attacked or have detected attempted attacks on their infrastructure. Others are still trapped in the social engineering racket. In this paper we identify the dynamic pattern and behavior of social engineering both from within and without the business enterprises. We used analytical method to identify the key factors and parameters that cause social engineering attacks in businesses .Causal loops are used to model the relationships of key parameters that contribute to cyber-attacks through social engineering through the patterns and behavior of social media users. Using stock and flow diagrams, we build a simulation model on Stella platform, analyze it and suggest possible solutions that business enterprises can take to implement measures through policy change.","PeriodicalId":440930,"journal":{"name":"Journal of Information Engineering and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Simulation Model of Social Engineering Attacks in Business Enterprises\",\"authors\":\"Francis Lowu, Hudson Nandere\",\"doi\":\"10.7176/jiea/11-2-10\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The pervasive use of social media in small and medium enterprises has increased social engineering cyber-attacks. Enterprises that have adopted the use of social media and emails to supplement on their marketing to complete business deals have been attacked or have detected attempted attacks on their infrastructure. Others are still trapped in the social engineering racket. In this paper we identify the dynamic pattern and behavior of social engineering both from within and without the business enterprises. We used analytical method to identify the key factors and parameters that cause social engineering attacks in businesses .Causal loops are used to model the relationships of key parameters that contribute to cyber-attacks through social engineering through the patterns and behavior of social media users. Using stock and flow diagrams, we build a simulation model on Stella platform, analyze it and suggest possible solutions that business enterprises can take to implement measures through policy change.\",\"PeriodicalId\":440930,\"journal\":{\"name\":\"Journal of Information Engineering and Applications\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Engineering and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.7176/jiea/11-2-10\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Engineering and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.7176/jiea/11-2-10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Simulation Model of Social Engineering Attacks in Business Enterprises
The pervasive use of social media in small and medium enterprises has increased social engineering cyber-attacks. Enterprises that have adopted the use of social media and emails to supplement on their marketing to complete business deals have been attacked or have detected attempted attacks on their infrastructure. Others are still trapped in the social engineering racket. In this paper we identify the dynamic pattern and behavior of social engineering both from within and without the business enterprises. We used analytical method to identify the key factors and parameters that cause social engineering attacks in businesses .Causal loops are used to model the relationships of key parameters that contribute to cyber-attacks through social engineering through the patterns and behavior of social media users. Using stock and flow diagrams, we build a simulation model on Stella platform, analyze it and suggest possible solutions that business enterprises can take to implement measures through policy change.