Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.6.1595

Building an Analysis Model for Social Engineering Based Cyberspace Operations  

Shin, Kyuyong (Cyber Warfare Research Center at Korea Military Academy)
Kim, Jeewon (Cyber Warfare Research Center at Korea Military Academy)
Lim, Hyun-myung (Cyber Warfare Research Center at Korea Military Academy)
Kim, Yongju (Cyber Warfare Research Center at Korea Military Academy)
Yoo, Jincheol (Cyber Warfare Research Center at Korea Military Academy)
Abstract
Recently, there has been an increase in the number of social engineering techniques that indirectly attack the target system administrators or organizational weaknesses rather than the traditional technical cyber attacks that directly attacked the target systems. Accordingly, the type analysis and case study of social engineering techniques are being actively conducted. There has been, however, little effort to derive an analysis model that systematically analyzes social engineering based cyberspace operations. Therefore, this paper aims at building a Social Engineering Based Cyberspace Operations Analysis Model, which can be used as a reference framework for a case study or attack scenario generation of social engineering based cyberspace operations.
Keywords
Social Engineering; Cyberspace Operations; Analysis Model;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Wenjun Fan, Kevin Lwakatare, and Rong Rong, "Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations," Computer Network and Information Security, vol. 9, pp. 1-11, Jan. 2017.
2 J. Piaget, The Language and Thought of the Child. New York: Harcourt, Brace, 1926.
3 J.M. Darley and B. Latane, "Bystander Intervention in Emergencies: Diffusion of Responsibility," Journal of Personality and Social Psychology, 8(4), pp. 377, 1986.   DOI
4 P.G. Zimbardo, "The Human Choice: Individuation, Reason, and Order Versus Deindividuation, Impulse, and Chaos," In Nebraska Symposium on Motivation. University of Nebraska press, 1969
5 S.T. Fiske and S.E. Taylor, Social Cognition. New York: McGraw-Hill, 1991
6 D. Kahneman and A. Tversky, Prospect Theory. Econometrica vol. 47 pp. 263-291, 1979   DOI
7 D. Kahneman, P. Slovic, and A. Tversky(eds.), Judgment under Uncertainty: Heuristics and Biases. Cambridge University Press, 1982.
8 V.H. Vroom, Work and Motivation. New York: Wiley, 1964
9 M. Sherif, O.J. Harvey, B.J. White, W.R. Hood, and C.W. Sherif, Intergroup Conflict and Cooperation: The Robbers Cave Experiment. Norman, OK: University Book Exchange, 1961.
10 Vircom, "18 Cyber Security Trends We Are Watching in 2018," https://www.vircom.com/blog/18-cyber-security-trends-we-are-watching-in-2018/, 12. January, 2018.
11 B.F. Skinner, "Superstition' in the Pigeon," Journal of Experimental Psychology, vol. 38, pp. 168-172, 1948.   DOI
12 Jin A Heo, Seong Bhin Joo, Jung Min Lee, and Chan Hyuk Park, "Countermeasures for Industrial Technology Protection in Social Engineering attack", The Journal of Social Science, vol. 23, no. 1, pp. 279-306, March 2016.
13 Kyuyong Shin, Jungho Kang, Jincheol Yoo, Jeewon Kim, Sungrok Kang, Hyunmyung Lim, and Yongju Kim, "A Study on the Concept of Social Engineering based Cyber Operations," Journal of The Korea Institute of Information Security & Cryptology, 28(3), pp. 707-716, June 2018.   DOI
14 Kyuyong Shin, Kyoung Min Kim, and Jongkwan Lee, "A Study on the Concept of Social Engineering Cyber Kill Chain for Social Engineering based Cyber Operations," Journal of The Korea Institute of Information Security & Cryptology, 28(5), Oct. 2018.
15 Jungho Kang, Kyuyong Shin, Jincheol Yoo, Jeewon Kim, Sungrok Kang, Hyunmyung Lim, and Yongju Kim, "A Study on the Relationship between Social Engineering and Cyberspace Operations," Ministry of Defense, Dec. 2017.