Peer-reviewed articles 17,970 +



Title: CYBERTERRORISM AND SOCIAL ENGINEERING - METHODS AND COUNTERMEASURES

CYBERTERRORISM AND SOCIAL ENGINEERING - METHODS AND COUNTERMEASURES
Barbora Kotkova; Marta Blahova
10.5593/sgem2023/2.1
1314-2704
English
23
2.1
•    Prof. DSc. Oleksandr Trofymchuk, UKRAINE 
•    Prof. Dr. hab. oec. Baiba Rivza, LATVIA
The article deals with the topic of cyberterrorism committed with the help of social engineering. It lists the means and methods used by modern cyber-terrorists but mentions in more detail the less common ones, which have a greater chance of success because they are not widely known. In the case of cyber terrorism or cyber war, the damage can become global. It is in the existential interest of every state or company to have a sufficient level of prevention against threats to its digital space and adequate settings of functional countermeasures. The article mentions these current countermeasures, especially the selected ones that correspond to the results of the SWOT analysis presented here. The topics of cybercrime include criminally punishable harmful behavior on the Internet such as Internet piracy (making illegal copies, illegal Peer-to-Peer file sharing, violation of copyright or industrial rights), dissemination of harmful content, a serious form of cyberbullying, cyber grooming, and cyberstalking. At present, especially the enormously increasing sophisticated organized crime, identity theft, or cyber-terrorism. From a general introduction to a better understanding of the topic, it goes on to a detailed description of individual current methods and focuses on the most frequently used techniques and methods of today like Watering Hole Attack, Cryptojacking, Pivoting, Credential Stuffing Attack, Website Defacement and Formjacking for example. In particular, social engineering methods, DDoS attacks, and password-cracking methods are described. Using an overview SWOT analysis, the article points out strengths and weaknesses, threats and opportunities concerning the currently most used methods of criminals. In conclusion, it presents the current requirements and measures, due to the constantly more sophisticated methods of modern attacks, for a secure organization and offers recommended procedures.
[1] VEGRICHTOVA, Barbora. The threat of radicalization: terrorism, warning signs and protection companies. Prague: Grada, 2019. ISBN 978-802-7120-314.
[2] BRZYBOHATY, Marian. Terorismus I. Praha: Police History, 1999. ISBN 80- 902670-1-7.
[3] National Cyber Security Index 2018: Methodology [online]. Tallinn: e-Governance Academy Rotermanni 8, 10111 Tallinn ega.ee, 2018 [cit. 13. 12. 2021].
[4] JUKL, Marek. Medical instructor of the Czech Red Cross. 2 edit. ed. [online]. Prague:Office of the Czech Red Cross, 2006. [cit. 03/01/2022]. ISBN 802544547X.
[5] Al-Fateh – The Hamas Web Magazine for Children: Indoctrination to Jihad, Annihilation and Self-Destruction [online]. Institute for Monitoring Peace and Cultural Tolerance in School Education, 2009. [cit. 15. 11. 2021].
[6] Why the U.S. Shouldn’t Play Games With Cyberwarfare as Its Power Declines [online]. [cit. 03.01. 2022].
[7] Terrorism: Modern terrorist methods. Ministry of the Interior of the Czech Republic [online]. [feeling. 01.11. 2021].
[8] KOTKOVA, Barbora a Martin HROMADA. The analysis of cyber attacks on energy systems in the world. In: International Multidisciplinary Scientific GeoConference Surveying Geology and Mining Ecology Management, SGEM [online]. Varna: International Multidisciplinary Scientific Geoconference, 2021, s. 51-58. [cit. 2023-06-15]. ISSN 1314-2704.
This research was based on the support of the Internal Grant Agency of Tomas Bata University in Zlin, the IGA / FAI / 2023/004 project and the Institute of Safety Engineering, Faculty of Applied Informatics.
conference
Proceedings of 23rd International Multidisciplinary Scientific GeoConference SGEM 2023
23rd International Multidisciplinary Scientific GeoConference SGEM 2023, 03 - 09 July, 2023
Proceedings Paper
STEF92 Technology
International Multidisciplinary Scientific GeoConference SGEM
SWS Scholarly Society; Acad Sci Czech Republ; Latvian Acad Sci; Polish Acad Sci; Russian Acad Sci; Serbian Acad Sci and Arts; Natl Acad Sci Ukraine; Natl Acad Sci Armenia; Sci Council Japan; European Acad Sci, Arts and Letters; Acad Fine Arts Zagreb Croatia; Croatian Acad Sci and Arts; Acad Sci Moldova; Montenegrin Acad Sci and Arts; Georgian Acad Sci; Acad Fine Arts and Design Bratislava; Russian Acad Arts; Turkish Acad Sci.
57-64
03 - 09 July, 2023
website
9088
cyberterrorism, hacker, network security, network threats, sniffing