Abstract
The human factor has a great influence on the security of information, in particular computer information, in almost any organization. Quite often people encounter attacks based on social engineering methods, but usually they do not even realize that, for example, an e-mail from a stranger contains a link that could cause personal data leakage. Social networks are developing both quantitatively and qualitatively. The security of user data in these networks is being improved. At the same time, users who actively maintain their social networks, post photos with their children, show themselves to everyone, leave their phone number in the public domain, and after a while they begin to receive calls from unfamiliar numbers in order to offer all sorts of intrusive services or attempts withdraw all funds from the user’s card. These examples relate to the personal life of a person, his money, but nothing prevents criminals from performing exactly the same attacks in order to steal from some huge company, for example, a seaport, whose money is many times greater than the money of an individual, and the withdrawal failure of the seaport information system can lead to a collapse. To increase the efficiency of protection of the information systems of the seaport, this work examines modern methods of social engineering, methods of countering attacks, principles of building information systems, and suggests improved methods of countering attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sokolov, S., Alimov, O.: Modern social engineering voice cloning technologies. In: Proceedings of the 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, EIConRus 2020, pp. 513–516 (2020). https://doi.org/10.1109/EIConRus49466.2020.9038954
Kardakova, M., Shipunov, I.: Cyber security on sea transport. Advances in Intelligent Systems and Computing, vol. 982, pp. 481–490 (2020). https://doi.org/10.1007/978-3-030-19756-8_46
Shipunov, I.S., Kardakova, M.V.: Information system for monitoring and analyzing the technical condition of autonomous vehicles. In: 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 497–500 (2020). https://doi.org/10.1109/EIConRus49466.2020.9039181
Shipunov, I.S., Voevodskiy, K.S.: About the problems of ensuring information security on unmanned ships. In: 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 339–343 (2019). https://doi.org/10.1109/EIConRus.2019.8657219
Nyrkov, A., Sokolov, S.: Using information technologies in dredging. Metall. Min. Ind. 7(6), 521–524 (2015). https://doi.org/10.1088/1757-899X/91/1/012064
Zhilenkov, A.A., Sokolov, S.S.: Intelligent autonomous navigation system for UAV in randomly changing environmental conditions. J. Intell. Fuzzy Syst. 38(5), 6619–6625 (2020). https://doi.org/10.3233/JIFS-179741
Nyrkov, A.P., Zhilenkov, A.A.: Hard- and software implementation of emergency prevention system for maritime transport. Autom. Remote Control 79(1), 195–202 (2018). https://doi.org/10.1134/S0005117918010174
Mamunts, D., Li, I.: The effect of dredger positioning accuracy on the environment. In: Proceedings of the 2016 IEEE North West Russia Section Young Researchers in Electrical and Electronic Engineering Conference, EIConRusNW 2016, pp. 435–437 (2016). https://doi.org/10.1109/EIConRusNW.2016.7448215
Mamunts, D., Kuznetsov, V.: Models and algorithms for estimation and minimization of the risks associated with dredging. Transp. Telecommun. 18(2), 139–145 (2017). https://doi.org/10.1515/ttj-2017-0013
Mikhail, I.I., Lauta, O.S.: Technique of information and telecommunications network synthesis under comprehensive hostile actions. In: International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon), Vladivostok, pp. 1–5 (2019). https://doi.org/10.1109/FarEastCon.2019.8933897
Bagretsov, S.A., Lauta, O.S.: Method for providing rationale of basic option of information and telecommunication network under hostile action. In: International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon), Vladivostok, pp. 5–7 (2019). https://doi.org/10.1109/FarEastCon.2019.8934215
Korotkov, V., Burlov, V.: Assessment of security of confidential information from leak on the acoustic and vibroacoustic channel on the basis of definition and calculation of coefficient of noise contamination and octava coefficient of noise contamination. In: Proceedings of the 2016 IEEE North West Russia Section Young Researchers in Electrical and Electronic Engineering Conference (2016 ElConRusNW), St. Petersburg, pp. 422–424 (2016). https://doi.org/10.1109/EIConRusNW.2016.7448211
Boriev, Z., Nekrasova, A.: Mathematical and information maintenance of biometric systems. IOP Conf. Ser. Mater. Sci. Eng. 124(1), 012046 (2016). https://doi.org/10.1088/1757-899X/124/1/012046
Boriev, Z., Nyrkov, A.: Software and hardware user authentication methods in the information and control systems based on biometrics. IOP Conf. Ser. Mater. Sci. Eng. 124(1), 012006 (2016). https://doi.org/10.1088/1757-899X/124/1/012006
Korobeynikov, A.G., Gatchin, Y.A.: Fejer means application for determination of mail document spam level. J. Mod. Appl. Sci. 30(30), 165 (2014). https://doi.org/10.5829/idosi.wasj.2014.30.mett.67
Bukharmetov, M.R., Mamunts, D.G.: Robust method for protecting electronic document on waterway transport with steganographic means by embedding digital watermarks into images. In: Proceedings of the 16-th Conference on Reliability and Statistics in Transportation and Communication, pp. 507–514 (2017). https://doi.org/10.1016/j.proeng.2017.01.097
Veselkov, V., Vikhrov, N.: Development of methods to identify risks to build up the automated diagnosis systems. In: 2017 IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (EIConRusNW), St. Petersburg, pp. 598–601 (2017). https://doi.org/10.1109/EIConRus.2017.7910625
Buslaev, A.P., Gorodnichev, M.G., Provorov, A.V.: One-dimensional models of particles flow and infocommunication methods of verification. In: 2014 International Conference on Computational Science and Computational Intelligence (2014). https://doi.org/10.1109/csci.2014.50
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sokolov, S., Nyrkov, A., Chernyi, S., Nazarov, N. (2021). Use of Social Engineering Methods in Transport: Methods, Protection, Facts, Consequences. In: Mottaeva, A. (eds) Proceedings of the XIII International Scientific Conference on Architecture and Construction 2020. ISCAC 2020. Lecture Notes in Civil Engineering, vol 130. Springer, Singapore. https://doi.org/10.1007/978-981-33-6208-6_7
Download citation
DOI: https://doi.org/10.1007/978-981-33-6208-6_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-6207-9
Online ISBN: 978-981-33-6208-6
eBook Packages: EngineeringEngineering (R0)