• Title/Summary/Keyword: 사회공학공격

Search Result 68, Processing Time 0.026 seconds

A Risk Assessment Scheme of Social Engineering Attacks for Enterprise Organizations (사회공학 공격에 대한 기업조직의 위험 수준 평가 방안)

  • Park, Younghoo;Shin, Dongcheon
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.103-110
    • /
    • 2019
  • Recently security related attacks occur in very diverse ways, aiming at people who operate the system rather than the system itself by exploiting vulnerabilities of the system. However, to the our best knowledge, there has been very few works to analyze and strategically to deal with the risks of social engineering attacks targeting people. In this paper, in order to access risks of social engineering attacks we analyze those attacks in terms of attack routes, attack means, attack steps, attack tools, attack goals. Then, with the purpose of accessing the organizational risks we consider the characteristics and environments of the organizations because the impacts of attacks on the organizations obviously depend on the characteristics and environments of the organizations. In addition, we analyze general attack risk assessment methods such as CVSS, CWSS, and OWASP Risk Rating Methodolog. Finally, we propose the risk access scheme of social engineering attacks for the organizations. The proposed scheme allows each organization to take its own proper actions to address social engineering attacks according to the changes of its environments.

Building an Analysis Model for Social Engineering Based Cyberspace Operations (사회공학 사이버작전 분석모델 정립연구)

  • Shin, Kyuyong;Kim, Jeewon;Lim, Hyun-myung;Kim, Yongju;Yoo, Jincheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1595-1606
    • /
    • 2018
  • Recently, there has been an increase in the number of social engineering techniques that indirectly attack the target system administrators or organizational weaknesses rather than the traditional technical cyber attacks that directly attacked the target systems. Accordingly, the type analysis and case study of social engineering techniques are being actively conducted. There has been, however, little effort to derive an analysis model that systematically analyzes social engineering based cyberspace operations. Therefore, this paper aims at building a Social Engineering Based Cyberspace Operations Analysis Model, which can be used as a reference framework for a case study or attack scenario generation of social engineering based cyberspace operations.

Social Engineering Attack Characteristics and Countermeasure Strategies of Major Threat Countries (주요 위협국의 사회공학 공격특징과 대응전략)

  • Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.165-172
    • /
    • 2023
  • Nation-state social engineering attacks are steadily being carried out as they are highly effective attacks, primarily to gain an advantage over secret information, diplomatic negotiations or future policy changes. As The Ukraine-Russia war prolongs, the activities of global hacking organizations are steadily increasing, and large-scale cyberattack attempts against major infrastructure or global companies continue, so a countermeasure strategy is needed. To this end, we determined that the social engineering attack cycle excluding physical contact among various social engineering models is the most suitable model, and analyzed the preferred social engineering attack method by comparing it with geopolitical tactics through case analysis. AS a result China favors phishing attacks, which prefer quantity over quality, such as man-made tactics, Russia prefers covert and complex spear phishing reminiscent of espionage warfare, and North Korea uses geopolitical tactics such as spear phishing and watering holes for attacks on the US and South Korea Most of the other countries aimed to secure funds with ransomware. Accordingly, a Clean Pass policy for China, periodic compulsory education in Russia, and international sanctions against North Korea were presented as countermeasure strategies.

A Study on the Concept of Social Engineering Cyber Kill Chain for Social Engineering based Cyber Operations (사회공학 사이버작전을 고려한 사회공학 사이버킬체인 개념정립 연구)

  • Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1247-1258
    • /
    • 2018
  • The Cyber Kill Chain originally proposed by Lockheed Martin defines the standard procedure of general cyber attacks and suggests tailored defensive actions per each step, eventually neutralizing the intent of the attackers. Defenders can effectively deal with Advanced Persistent Threat(APT)s which are difficult to be handled by other defensive mechanisms under the Cyber Kill Chain. Recently, however, social engineering techniques that exploits the vulnerabilities of humans who manage the target systems are prevail rather than the technical attacks directly attacking the target systems themselves. Under the circumstance, the Cyber Kill Chain model should evolve to encompass social engineering attacks for the improved effectiveness. Therefore, this paper aims to establish a definite concept of Cyber Kill Chain for social engineering based cyber attacks, called Social Engineering Cyber Kill Chain, helping future researchers in this literature.

인간의 감정 상태를 이용한 사회공학 기법 연구

  • Park, Jae-Hyeok;Lee, Jae-Woo
    • Review of KIISC
    • /
    • v.25 no.4
    • /
    • pp.57-62
    • /
    • 2015
  • 최근의 정보보호 관련 사고를 살펴보면 기업 내부자로 인한 개인정보의 유출과 같이 특별한 기술 없이 이루어지는 인간 중심의 정보보호가 이슈화되고 있다. 그만큼 점점 사회공학적인 위협이 증가하고 있는 추세이며, 그 위험성이 사회 전반적으로 인식되어가고 있다. 본 지를 통해 사회공학의 의미에 대해 되짚어보고, 사회공학 라이프 사이클과 최근의 사회공학 공격 기법에 대해 분석한다. 또한 일반적 사회공학 의미인 인간 상호 작용의 깊은 신뢰를 바탕으로 사람들을 속여서 보안 절차를 우회하는 등의 기존 개념에 더하여 유사한 사례를 바탕으로 인간의 대표적 감정 상태(두려움, 슬픔, 기쁨)를 이용한 사회공학 기법에 대해 논한다.

Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique (사회공학기법을 이용한 피싱 공격 분석 및 대응기술)

  • Lee, Dong-Hwi;Choi, Kyong-Ho;Lee, Dong-Chun;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.171-177
    • /
    • 2006
  • The hacking aspect of recent times is changing, the phishing attack which uses a social engineering technique is becoming the threat which is serious in Information Security. It cheats the user and it acquires a password or financial information of the individual and organization. The phishing attack uses the home page which is fabrication and E-mail and acquires personal information which is sensitive and financial information. This study proposes the establishment of National Fishing Response Center, complement of relation legal system Critical intelligence distribution channel of individual and enterprise.

  • PDF

DoI(Denial of Information) 공격 동향과 대응 프레임워크 분석

  • 김국한;최병철;유종호;서동일
    • Review of KIISC
    • /
    • v.16 no.1
    • /
    • pp.21-30
    • /
    • 2006
  • 현대의 인터넷 환경에서는 다양한 서비스 채널을 통해 정보의 유통이 활발히 이루어지고 있다. 이러한 환경에서는 기존의 정보보호의 한계를 이용하는. 특히 사회 공학적 공격 기법을 활용하는 DoI(Denial of Information. 정보거부) 공격과 같은 사이버공격으로 인해 중요한 보안 문제를 유발 할 수 있다. DoI 공격은 악의적인 공격자가 유용한 정보임을 가장하여 의도적으로 악성정보를 포함하여 유통함으로서, 네트워크 사용자가 원하는 정보를 찾아서 자기 것으로 만드는데 필요한 다양한 가용 자원을 소모하도록 하는 공격이다. 본고에서는 현재 만연하는 DoI 공격의 형태 및 상황을 알아보고. DoI 공격을 대응하기 위한 프레임워크는 어떤 것이 있는지 살펴본다.

A Study on the Concept of Social Engineering Based Cyber Operations (사회공학 사이버작전 개념정립 연구)

  • Shin, Kyuyong;Kang, Jungho;Yoo, Jincheol;Kim, Jeewon;Kang, Sungrok;Lim, Hyunmyung;Kim, Yongju
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.707-716
    • /
    • 2018
  • Recently, instead of technical cyber operations that directly attack the target information system by using cyber attack techniques, social engineering techniques that indirectly invade the system by exploiting the vulnerabilities of persons who manage the system are being watched. Despite this trend, there is a lot of confusion because there is no clear concept about the relationship between cyber operations and social engineering techniques. Therefore, this paper aims at establishing a clear concept of a social engineering cyber operation, helping future researchers in this literature.

메타버스 침해대응 사례 분석을 통한 메타버스 플랫폼 위협벡터 도출

  • Lee, Ji-Hyeon;Jung, Hye-Lim;Park, Ki-Woong
    • Review of KIISC
    • /
    • v.32 no.4
    • /
    • pp.33-40
    • /
    • 2022
  • 최근 전 세계가 COVID-19 팬데믹을 겪으면서 실세계 속 사회 및 문화 활동이 온라인 등 비대면으로 옮겨지며 비대면 사회활동 및 가치 창출을 위한 메타버스 플랫폼들이 생겨나기 시작하고 이들의 사회적 파급력 및 가치가 높아지고 있다. 메타버스 플랫폼에서 수행되는 사회 및 문화 활동의 가치가 높아짐에 따라 메타버스 플랫폼은 해커에게 '저비용 고효율'적인 공격 대상이 되어 메타버스의 안전성 및 보안성 이슈가 화두가 되고 있다. 본 논문에서는 메타버스 플랫폼을 대표하는 'ZEPETOTM', 'RobloxTM', '어스2TM' 등의 메타버스 플랫폼에서 발생한 보안사고의 공격 지점 및 연관된 공격 체인을 조사하고 메타버스를 구성하고 있는 핵심 시스템 요소에 대한 위협벡터를 도출하였다. 본 연구 수행에서 활용한 방법론은 메타버스 플랫폼뿐만 아니라 신규 소프트웨어 기반 플랫폼이 출시될 때의 위협벡터를 도출하고 그에 따른 보안대책 수립을 위한 활용으로 사용될 수 있다.

D-PASS: A Study on User Authentication Method for Smart Devices (D-PASS: 스마트 기기 사용자 인증 기법 연구)

  • Jeoung, You-Sun;Choi, Dong-Min
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.915-922
    • /
    • 2017
  • The rapid increase in users of mobile smart devices has greatly expanded their range of activities. Compare to conventional mobile devices, smart devices have higher security requirements because they manage and use various kind of confidential information of the owners. However, the cation schemes provided by conventional smart devices are vulnerable to recent attacks such as shoulder surfing, recording, and smudge attacks, which are the social engineering attacks among the types of security attacks targeting the smart devices. In this paper, we propose a novel authentication method that is robust against social engineering attacks but sufficiently considering user's convenience. The proposed method is robust by using combination of a graphical authentication method and a text-based authentication method. Furthermore, our method is easier to memorize the password compare to the conventional graphical authentication methods.