{"title":"应对负面社交工程技术","authors":"Antonina V. Cheretskikh","doi":"10.47475/2411-0590-2023-10-4-474-484","DOIUrl":null,"url":null,"abstract":"The article reveals the issues of counteraction, prevention and suppression of destructive methods of social engineering in the sphere of information-telecommunication interaction. The techniques and methods of destructive social engineering that are currently widespread are considered . The available ways of counteraction and prevention of the negative influence of social engineering are analyzed, reasonable conclusions about the effectiveness of these methods are presented . The ways of solving the problems identified in the course of the study, namely, the methods of suppression (eradication) of negative methods of social engineering are proposed . The conclusions presented in the article have practical significance, which consists in the fact that the provisions and recommendations formulated in them can be used to justify proposals to improve the legislative framework in the field of suppression, prevention and prophylaxis of crimes committed with the use of information and telecommunication technologies .","PeriodicalId":85835,"journal":{"name":"Victimology","volume":"61 5","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Countering Negative Social Engineering Techniques\",\"authors\":\"Antonina V. Cheretskikh\",\"doi\":\"10.47475/2411-0590-2023-10-4-474-484\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article reveals the issues of counteraction, prevention and suppression of destructive methods of social engineering in the sphere of information-telecommunication interaction. The techniques and methods of destructive social engineering that are currently widespread are considered . The available ways of counteraction and prevention of the negative influence of social engineering are analyzed, reasonable conclusions about the effectiveness of these methods are presented . The ways of solving the problems identified in the course of the study, namely, the methods of suppression (eradication) of negative methods of social engineering are proposed . The conclusions presented in the article have practical significance, which consists in the fact that the provisions and recommendations formulated in them can be used to justify proposals to improve the legislative framework in the field of suppression, prevention and prophylaxis of crimes committed with the use of information and telecommunication technologies .\",\"PeriodicalId\":85835,\"journal\":{\"name\":\"Victimology\",\"volume\":\"61 5\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-02-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Victimology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47475/2411-0590-2023-10-4-474-484\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Victimology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47475/2411-0590-2023-10-4-474-484","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The article reveals the issues of counteraction, prevention and suppression of destructive methods of social engineering in the sphere of information-telecommunication interaction. The techniques and methods of destructive social engineering that are currently widespread are considered . The available ways of counteraction and prevention of the negative influence of social engineering are analyzed, reasonable conclusions about the effectiveness of these methods are presented . The ways of solving the problems identified in the course of the study, namely, the methods of suppression (eradication) of negative methods of social engineering are proposed . The conclusions presented in the article have practical significance, which consists in the fact that the provisions and recommendations formulated in them can be used to justify proposals to improve the legislative framework in the field of suppression, prevention and prophylaxis of crimes committed with the use of information and telecommunication technologies .