检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:高小辉 Gao Xiaohui(Department of Electrical Information,Shandong University of Science and Technology,Jinan 250000)
机构地区:[1]山东科技大学电气信息系,山东济南250000
出 处:《中阿科技论坛(中英文)》2020年第6期147-150,共4页China-Arab States Science and Technology Forum
摘 要:随着软硬件的快速发展,人本在享受物联网带来的简易生活时,同时人的信息安全和财产安全变得更加重要,了解网络中的攻击手段就显得更为重要,论文基于对社会工程学的攻击原理进行分析,采取实践应用方法,将其攻击流程和手段展示出来,最终目的是为保护信息安全提供基本依据和启发。重点介绍了四种生活中普遍见到的社会工程学攻击方式,并通过kalix操作系统和setoolkit攻击套件进行实践,给出攻击方式的理念和方式,并展现其攻击的多样化。With the rapid development of software and hardware,when people are enjoying the simple life brought by the Internet of Things,at the same time,people’s information security and property security become more important,and it is more important to understand the attack methods in the network.The paper is based on the attack principle of social engineering,adopts a practical application method,and displays its attack process and means.The ultimate goal is to provide basic basis and inspiration for protecting information security.It focuses on the four social engineering attack methods commonly seen in life,and is practiced through the kalix operating system and setoolkit attack suite.The concepts and methods of the attack methods are given,and the diversity of their attacks is demonstrated.
关 键 词:社会工程学攻击 kali 栈溢出漏洞 网络信息安全
分 类 号:D918[政治法律—法学] TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.171