Modeling the Risks of Socioengineering Attacks on the Information System Based on the Method of Cognitive Mapping

Authors

DOI:

https://doi.org/10.34739/dsd.2025.02.08

Keywords:

information security, social engineereng, human factor, cognitive mapping, mathematical modeling

Abstract

The article explored the key methods of social attacks, including phishing, vishing, spear phishing, and trust manipulation, which allow attackers to bypass even the most sophisticated defense mechanisms. Special attention is focused on analyzing the human factor as a critical element of security. The research shows that about 70% of incidents are related to the actions of users themselves, who may be unaware, psychologically vulnerable, or subject to external influence. The practical significance of the study is to develop strategies to minimize the risks of social engineering. The proposed measures include comprehensive staff training, the use of multi-level authentication, restriction of access rights, implementation of software monitoring of suspicious actions, and threat modeling based on cognitive analysis. The presented results may be useful for security policy makers, information security professionals, and researchers in the field of cyber defense. 

Downloads

Download data is not yet available.

Downloads

Published

26.03.2026

How to Cite

Konrad, T., Noga, H., Trofymchuk, V. ., Gajewska, A., Kluczewska-Chmielarz, K., & Volkogon, V. (2026). Modeling the Risks of Socioengineering Attacks on the Information System Based on the Method of Cognitive Mapping. De Securitate Et Defensione. Security and Defense Journal, 11(2), 124-140. https://doi.org/10.34739/dsd.2025.02.08