Kontaktujte nás | Jazyk: čeština English
dc.title | Cyber security and social engineering | en |
dc.contributor.author | Kotková, Barbora | |
dc.contributor.author | Hromada, Martin | |
dc.relation.ispartof | Proceedings - 25th International Conference on Circuits, Systems, Communications and Computers, CSCC 2021 | |
dc.identifier.isbn | 978-1-66542-749-4 | |
dc.date.issued | 2021 | |
dc.citation.spage | 134 | |
dc.citation.epage | 140 | |
dc.event.title | 25th International Conference on Circuits, Systems, Communications and Computers, CSCC 2021 | |
dc.event.location | Crete Island | |
utb.event.state-en | Greece | |
utb.event.state-cs | Řecko | |
dc.event.sdate | 2021-07-19 | |
dc.event.edate | 2021-07-22 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
dc.identifier.doi | 10.1109/CSCC53858.2021.00031 | |
dc.relation.uri | https://ieeexplore.ieee.org/document/9668708 | |
dc.subject | social engineering | en |
dc.subject | scamming | en |
dc.subject | cyber-security | en |
dc.subject | sensitive personal information | en |
dc.subject | cyber attack | en |
dc.subject | hazard | en |
dc.subject | defense | en |
dc.subject | data abuse | en |
dc.description.abstract | Nowadays, it is quite common to use modern information technology at work, at school and in private life. Shared information can be used not only for advertising and statistics purposes. Low levels of awareness, inattention and trust can lead to the misuse of this information, using computers and smart mobile devices using the Internet. This article aims to summarize in the introduction the most common methods used to misuse information and what user behavior leads to this. Furthermore, the article then describes the purpose for which this information is misused. The conclusion then describes the methods of protection. It is necessary to constantly draw attention to this issue so that users themselves focus on information security in the environment of information and communication technologies. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1010868 | |
utb.identifier.obdid | 43883189 | |
utb.identifier.scopus | 2-s2.0-85125008962 | |
utb.identifier.wok | 000848667100022 | |
utb.source | d-scopus | |
dc.date.accessioned | 2022-03-11T08:48:28Z | |
dc.date.available | 2022-03-11T08:48:28Z | |
dc.description.sponsorship | Univerzita Tomáše Bati ve Zlíně: IGA/FAI/2021/002 | |
dc.description.sponsorship | Internal Grant Agency of Tomas Bata University in Zlin; Institute of Safety Engineering, Faculty of Applied Informatics; [IGA/FAI/2021/002] | |
utb.contributor.internalauthor | Kotková, Barbora | |
utb.contributor.internalauthor | Hromada, Martin | |
utb.fulltext.affiliation | Barbora Kotkova Tomas Bata University in Zlín Zlin, Czech Republic [email protected] Martin Hromada Tomas Bata University in Zlín Zlin, Czech Republic [email protected] | |
utb.fulltext.dates | - | |
utb.fulltext.references | [1] Where are the boundaries of ethical hacking? https://www.systemonline.cz/it-security/kde-jsou-hranice-etickehohackingu.htm [2] KUCHTA, Josef. Current problems of cybercrime, including its prevention. Journal for legal science and practice. [Online]. 2016, No. 1, pp. 5-19. [feeling. 2021-05-01]. [3] Government Proposal No. 28 of the Senate of the Czech Republic of 2013 to express consent to ratification, https://www.senat.cz/xqw/xervlet/pssenat [4] MATEJKA, Ján. The Internet as an object of law: seeking a balance between autonomy and privac, ISBN 978-80-904248-7-6. [5] JANSA, Lukáš et al. Internet law. 1st edition Brno: Computer Press, 2016. ISBN 978-80-251-4664-4. [6] DONÁT, Josef and Jan TOMÍŠEK. Network Law: A Guide to Internet Law. 1st ed. Prague: C.H. Beck, 2016. ISBN 978-80-7400-610-4. [7] JIROVSKÝ, Václav. Cybercrime: not just about hacking, cracking, viruses and Trojans without secrets. 1st ed. Prague: Grada, 2007. ISBN 978-80-247-1561-2. [8] PĚNČÍK, Lukáš. Current trends in cybercrime and computer data security. [online]. Brno, 2020 [cit. 2021-04-30]. [9] JANSA, Lukáš et al. Internet law, 2020, Computer Press, ISBN 978-80-2514-664-4. [10] KOLOUCH, Jan. CyberCrime, 2017, CZ.NIC, ISBN 978-80-88168-15-7. [11] Quora. [online]. How does Bayesian spam filtering work ?. [Feeling. 02/02/2018]. Available from: https://www.quora.com/How-doesBayesian-spam-filtering-work [12] https://www.knowbe4.com/hubfs/SecurityAwarenessTrainingDeploymentsDeterDefeatHackers.pdf [13] ROZMAROVA, Monika. Risks of misuse of private information in the Internet environment [online]. Brno, 2018 [cit. 2021-04-30]. [14] Statistics on resolved incidents. CSIRT [online]. Czech Republic [cit. 6/25/2020]. Available from: <https://csirt.cz/cs/o-nas/statistiky/>. [15] NETOLIČKA, Jan. \ textit {Scamming: Techniques of obtaining sensitive data in the online environment} [online]. Brno, 2020 [cit. 2021-04-30]. [16] www.policie.cz [17] Act No. 181/2014 Coll. Laws for people [online]. Czech Republic [cit. 6/23/2020]. [18] Roumen Trifonov, Slavcho Manolov, Georgi Tsochev, Galya Pavlova, Automation of Cyber Security Incident Handling Incident through Artificial Intelligence Methods, WSEAS Transaction on Computers, ISSN / E-ISSN: 1109-2750 / 2224-2872 | |
utb.fulltext.sponsorship | This research was based on the support of the Internal Grant Agency of Tomas Bata University in Zlín, the IGA / FAI / 2021/002 project and the Institute of Safety Engineering, Faculty of Applied Informatics. | |
utb.wos.affiliation | [Kotkova, Barbora; Hromada, Martin] Tomas Bata Univ Zlin, Zlin, Czech Republic | |
utb.scopus.affiliation | Tomas Bata University in Zlín, Zlin, Czech Republic | |
utb.fulltext.projects | IGA/FAI/2021/002 | |
utb.fulltext.faculty | - | |
utb.fulltext.ou | - |