The paper presents the main key features of social engineering and a social engineer activity. Emphasis is placed on the study of social engineering techniques in the system of human-machine interaction used to implement the illegal (malicious) manipulation of human behavior patterns. The matrix of social engineering qualification criteria and the map of information security risks caused by social engineer actions were built.
IntroductionThe practice of human-machine interaction (HMI) makes increasingly high demands on the level of information security. This process is like an eternal dispute -what is stronger, a sword or a shield. The evolution of information protection methods reflects the evolution of unauthorized data access methods [1]. Nowadays people are actively embedding computers in their environment; they are trying to make the computer more "human", the level of computer dependence on the outside world also increases with the development of networks [2,3]. On the other hand, the human factor continues to be the least controlled element of HMI [4], which, in turn, according to the modern information and communication technologies development creates not only new opportunities, but also new risks [5]. As a result, the number of information security [6] vulnerability factors increases. Someday, a computer will learn how to evaluate human behavior [7,8] and make decisions based on the results of cognitive processes analysis, considering the value and semantic aspects of personality behavior. Consequently, we are waiting for a new evolutionary leap in the confrontation of "sword and shield". But, so long as a person is only understandable by the other person, the social engineering knowledge will be in demand [9]. qualitative terms of "probability" and "impact" on the risk object dispersed in an ascending order.