作者: Francois Mouton , Alastair Nottingham , Louise Leenen , H.S. Venter
DOI: 10.1109/ISSA.2017.8251781
关键词: Social engineering (security) 、 Context model 、 Human–computer interaction 、 Automaton 、 Information security 、 Information sensitivity 、 Flowchart 、 Finite-state machine 、 Computer science 、 Bidirectional communication
摘要: Information security is a fast-growing discipline, and relies on continued improvement of measures to protect sensitive information. In general, human operators are often highly susceptible manipulation, tend be one the weakest links in chain. A social engineering attack targets this weakness by using various manipulation techniques elicit individuals perform requests. The field still its infancy with respect formal definitions, frameworks, examples attacks detection models. order formally address broad context, paper proposes underlying finite state machine Social Engineering Attack Detection Model (SEADM). model has been proven successfully thwart utilising either bidirectional communication, unidirectional communication or indirect communication. Proposing exploring allows have clearer overview mental processing performed within model. While current provides general procedural template for implementing mechanisms attacks, more abstract extensible that highlights interconnections between task categories associated different scenarios. intended help facilitate incorporation organisation specific extensions grouping similar activities into distinct categories, subdivided states. addition, it facilitates additional analysis transitions difficult extract from original flowchart based