Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.3.707

A Study on the Concept of Social Engineering Based Cyber Operations  

Shin, Kyuyong (Korea Military Academy)
Kang, Jungho (Korea Military Academy)
Yoo, Jincheol (Korea Military Academy)
Kim, Jeewon (Korea Military Academy)
Kang, Sungrok (Korea Military Academy)
Lim, Hyunmyung (Korea Military Academy)
Kim, Yongju (Korea Military Academy)
Abstract
Recently, instead of technical cyber operations that directly attack the target information system by using cyber attack techniques, social engineering techniques that indirectly invade the system by exploiting the vulnerabilities of persons who manage the system are being watched. Despite this trend, there is a lot of confusion because there is no clear concept about the relationship between cyber operations and social engineering techniques. Therefore, this paper aims at establishing a clear concept of a social engineering cyber operation, helping future researchers in this literature.
Keywords
Social Engineering; Cyber Operations; Cyber Warfare;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Bryan Skarda, Robert F. Mills, Todd McDonald, Dennis Strouble, "Operationalizing Social Engineering for Offensive Cyber Operations," Technical Report, Air Force Institute of Technology, June 2008.
2 Wenjun Fan, Kevin Lwakatare and Rong Rong, "Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations," Computer Network and Information Security, vol. 9, pp. 1-11, Jan. 2017.
3 Nabie Y. Conteh1 and Paul J. Schmick, "Cybersecurity : risks, vulnerabilities and countermeasures to prevent social engineering attacks," International Journal of Advanced Computer Research, vol 6, no. 23, pp. 31-38, Feb. 2016.   DOI
4 P. S. Maan and Manish Sharma, " Social Engineering: A Partial Technical Attack," International Journal of Computer Science Issues, vol. 9, no. 2, pp. 557-559, March 2012.
5 John Orbell and Robyn M. Dawes, "A "Cognitive Miser" Theory of Cooperators Advantage," The American Political Science Review, vol. 85, no. 2, pp. 515-528, June 1991.   DOI
6 Dept. of Computer Science in Korea Military Academy, Korea Naval Academy, Korea Air Force Academy, and Korea Army Academy at Yeong-Cheon, Introduction to Cyber Warfare, 2nd Ed., Yangseogak, Feb. 2016.
7 ROK Army Training & Doctrine Command, "FM 1-1 Military Terminology," Republic of Korea Army Headquarters, May 2017.
8 Dong Cheon Shin and Young Hoo Park, "Development of Risk Assessment Indices for Social Engineering Attacks," Journal of Security Engineering, 14(2), pp. 143-156, April 2017.   DOI
9 Kevin D. Mitnick and William L. Simon, The Art of Deception : Controlling the Human Element of Security, John Wiley & Sons, 2003.
10 Jungho Kang et. al., "A Study on the Relationship between Social Engineering and Cyberspace Operations," Ministry of Defense, Dec. 2017.
11 US Joint Chief of Staff, "JP 3-12(R) Cyberspace Operations," Feb. 2013.