Skip to main content

Use of Social Engineering Methods in Transport: Methods, Protection, Facts, Consequences

  • Conference paper
  • First Online:
Proceedings of the XIII International Scientific Conference on Architecture and Construction 2020 (ISCAC 2020)

Abstract

The human factor has a great influence on the security of information, in particular computer information, in almost any organization. Quite often people encounter attacks based on social engineering methods, but usually they do not even realize that, for example, an e-mail from a stranger contains a link that could cause personal data leakage. Social networks are developing both quantitatively and qualitatively. The security of user data in these networks is being improved. At the same time, users who actively maintain their social networks, post photos with their children, show themselves to everyone, leave their phone number in the public domain, and after a while they begin to receive calls from unfamiliar numbers in order to offer all sorts of intrusive services or attempts withdraw all funds from the user’s card. These examples relate to the personal life of a person, his money, but nothing prevents criminals from performing exactly the same attacks in order to steal from some huge company, for example, a seaport, whose money is many times greater than the money of an individual, and the withdrawal failure of the seaport information system can lead to a collapse. To increase the efficiency of protection of the information systems of the seaport, this work examines modern methods of social engineering, methods of countering attacks, principles of building information systems, and suggests improved methods of countering attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sokolov, S., Alimov, O.: Modern social engineering voice cloning technologies. In: Proceedings of the 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, EIConRus 2020, pp. 513–516 (2020). https://doi.org/10.1109/EIConRus49466.2020.9038954

  2. Kardakova, M., Shipunov, I.: Cyber security on sea transport. Advances in Intelligent Systems and Computing, vol. 982, pp. 481–490 (2020). https://doi.org/10.1007/978-3-030-19756-8_46

  3. Shipunov, I.S., Kardakova, M.V.: Information system for monitoring and analyzing the technical condition of autonomous vehicles. In: 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 497–500 (2020). https://doi.org/10.1109/EIConRus49466.2020.9039181

  4. Shipunov, I.S., Voevodskiy, K.S.: About the problems of ensuring information security on unmanned ships. In: 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 339–343 (2019). https://doi.org/10.1109/EIConRus.2019.8657219

  5. Nyrkov, A., Sokolov, S.: Using information technologies in dredging. Metall. Min. Ind. 7(6), 521–524 (2015). https://doi.org/10.1088/1757-899X/91/1/012064

    Article  Google Scholar 

  6. Zhilenkov, A.A., Sokolov, S.S.: Intelligent autonomous navigation system for UAV in randomly changing environmental conditions. J. Intell. Fuzzy Syst. 38(5), 6619–6625 (2020). https://doi.org/10.3233/JIFS-179741

    Article  Google Scholar 

  7. Nyrkov, A.P., Zhilenkov, A.A.: Hard- and software implementation of emergency prevention system for maritime transport. Autom. Remote Control 79(1), 195–202 (2018). https://doi.org/10.1134/S0005117918010174

    Article  MATH  Google Scholar 

  8. Mamunts, D., Li, I.: The effect of dredger positioning accuracy on the environment. In: Proceedings of the 2016 IEEE North West Russia Section Young Researchers in Electrical and Electronic Engineering Conference, EIConRusNW 2016, pp. 435–437 (2016). https://doi.org/10.1109/EIConRusNW.2016.7448215

  9. Mamunts, D., Kuznetsov, V.: Models and algorithms for estimation and minimization of the risks associated with dredging. Transp. Telecommun. 18(2), 139–145 (2017). https://doi.org/10.1515/ttj-2017-0013

    Article  Google Scholar 

  10. Mikhail, I.I., Lauta, O.S.: Technique of information and telecommunications network synthesis under comprehensive hostile actions. In: International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon), Vladivostok, pp. 1–5 (2019). https://doi.org/10.1109/FarEastCon.2019.8933897

  11. Bagretsov, S.A., Lauta, O.S.: Method for providing rationale of basic option of information and telecommunication network under hostile action. In: International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon), Vladivostok, pp. 5–7 (2019). https://doi.org/10.1109/FarEastCon.2019.8934215

  12. Korotkov, V., Burlov, V.: Assessment of security of confidential information from leak on the acoustic and vibroacoustic channel on the basis of definition and calculation of coefficient of noise contamination and octava coefficient of noise contamination. In: Proceedings of the 2016 IEEE North West Russia Section Young Researchers in Electrical and Electronic Engineering Conference (2016 ElConRusNW), St. Petersburg, pp. 422–424 (2016). https://doi.org/10.1109/EIConRusNW.2016.7448211

  13. Boriev, Z., Nekrasova, A.: Mathematical and information maintenance of biometric systems. IOP Conf. Ser. Mater. Sci. Eng. 124(1), 012046 (2016). https://doi.org/10.1088/1757-899X/124/1/012046

    Article  Google Scholar 

  14. Boriev, Z., Nyrkov, A.: Software and hardware user authentication methods in the information and control systems based on biometrics. IOP Conf. Ser. Mater. Sci. Eng. 124(1), 012006 (2016). https://doi.org/10.1088/1757-899X/124/1/012006

    Article  Google Scholar 

  15. Korobeynikov, A.G., Gatchin, Y.A.: Fejer means application for determination of mail document spam level. J. Mod. Appl. Sci. 30(30), 165 (2014). https://doi.org/10.5829/idosi.wasj.2014.30.mett.67

    Article  Google Scholar 

  16. Bukharmetov, M.R., Mamunts, D.G.: Robust method for protecting electronic document on waterway transport with steganographic means by embedding digital watermarks into images. In: Proceedings of the 16-th Conference on Reliability and Statistics in Transportation and Communication, pp. 507–514 (2017). https://doi.org/10.1016/j.proeng.2017.01.097

  17. Veselkov, V., Vikhrov, N.: Development of methods to identify risks to build up the automated diagnosis systems. In: 2017 IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (EIConRusNW), St. Petersburg, pp. 598–601 (2017). https://doi.org/10.1109/EIConRus.2017.7910625

  18. Buslaev, A.P., Gorodnichev, M.G., Provorov, A.V.: One-dimensional models of particles flow and infocommunication methods of verification. In: 2014 International Conference on Computational Science and Computational Intelligence (2014). https://doi.org/10.1109/csci.2014.50

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nikita Nazarov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sokolov, S., Nyrkov, A., Chernyi, S., Nazarov, N. (2021). Use of Social Engineering Methods in Transport: Methods, Protection, Facts, Consequences. In: Mottaeva, A. (eds) Proceedings of the XIII International Scientific Conference on Architecture and Construction 2020. ISCAC 2020. Lecture Notes in Civil Engineering, vol 130. Springer, Singapore. https://doi.org/10.1007/978-981-33-6208-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-33-6208-6_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-33-6207-9

  • Online ISBN: 978-981-33-6208-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics