INTERNATIONAL EXPERIENCE OF THE EU COUNTRIES AND KAZAKHSTAN IN ADDRESSING CYBERSECURITY ISSUES
DOI:
https://doi.org/10.52123/1994-2370-2025-1663Keywords:
Security Operations Center, Artificial Intelligence, cyber range, digital society, cybersecurity, social engineering, sociotechnical attacks, cybercrimeAbstract
The article is devoted to the problems of developing a system for assessing security against social engineering attacks. The purpose of the article is to study and analyze methods of protection against sociotechnical attacks and to develop a system for assessing security against social engineering attacks. The article describes techniques for collecting information from open sources, communication modeling, and profiling, basic principles of social engineering and the application of social engineering. Effective protection tools against social engineering have also been investigated and the process of developing a phishing simulator to counteract social engineering through phishing has been step-by-step reviewed. The article examines awareness-raising and learning is one of the key methods for assessing and effectively protecting against social engineering, and discusses effective methods of protecting against social engineering. The article also summarizes the results of the research, analysis and development of the system, as well as describes further steps to develop this area. The introduction of an effective cybersecurity training system will significantly increase the level of security and reduce the risk of data leakage, which is a key step to ensure information security.
References
References
1. Hednegi, K. (2021). Unmasking the social engineer: The human element of security. Indianapolis, IN.
2. Kiberprestuplenie veka: Carbanak. (n.d.). Kaspersky. https://www.kaspersky.ru/blog/
/billion-dollar-apt-carbanak/6950/
3. Zaşita ot SI. (n.d.). Kaspersky. https://www.kaspersky.ru/resource-
center/threats/how-to-avoid-social-engineering-attacks
4. Yazan, A. A., & Reema, A. (2024). Exploring the potential implication of AI-generated content in social engineering attacks. International Journal of Computing and Digital Systems.
5. Salal, A. K. (2023). Social engineering. MACS, St. Francis Xavier University, Canada.
6. İubuzova, H. İ., & Myrzaş, B. B. (2024, May 31). İskustvennyi intelekt v moşenicheskih shemah. In Nauchnyi progres: problemy i perspektivy razvitia (pp. 31–34). Zapadno-Sibirskii nauchnyi sentr.
7. Myrzaş, B. B. (2024). Razrabotka sistemy otsenki zashishchennosti ot sotsiotehnicheskih atak (Master’s thesis). KazNITU imeni K. Satpaeva.
8. Jekebayeva, M. A. (2023). Aqparattyq qoğamdağy jeke bas bostandyğyna tönetın qauıpter jäne aqparattyq mädeniet. In 5th International Symposium on Turcology Studies, Van, Turkey.
9. Jekebayeva, M. A. (2023). Jastar arasındağy kiberqauıpsızdık: sıfrlyq däuırdegı qorğanys. In 5th International Symposium on Turcology Studies, Van, Turkey.
10. Jekebayeva, M. A., Iztaeva, V., Anassova, K. T., & Manapbayev, N. (2023). Cybersecurity: Importance for Kazakhstan and international experiences. Habarşysy Abylai han atyndağy QazHQjÄTU. Halyqaralyq qatynastar jäne aimaqtanu seriasy, 4(54), 80–93.
11. Alimseitova, Zh., Adranova, A., Akhmetov, B., Lakhno, V., Zhilkishbayeva, G., & Smirnov, O. A. (2020). Models and algorithms for ensuring functional stability and cybersecurity of virtual cloud resources. Journal of Theoretical and Applied Information Technology, 98(21), 3334–3346.
12. Lakhno, V., Togzhanova, K., Kasatkin, D., Kartbayev, T., Uskenbayeva, R., Alimseitova, Zh., & Kashaganova, G. (2021). The information technologies in the tasks of planning of smart city development. Journal of Theoretical and Applied Information Technology, 99(14), 3645–3662.
13. Lakhno, V., Kartbayev, T., Malyukov, V., Uskenbayeva, R., Togzhanova, K., Alimseitova, Zh., Beketova, G., & Turgynbayeva, A. (2021). Risk assessment of investment losses aimed at the development of smart city systems. Journal of Theoretical and Applied Information Technology, 99(15), 3683–3692.
14. Kartbayev, T., Lakhno, V., Malyukov, V., Turgynbayeva, A., Alimseitova, Zh., Malikova, G., & Kashaganova, G. (2022). Model for the decision support system during the procedure of investment projects assessment in the field of enterprise digitalization considering multifactorality. Journal of Theoretical and Applied Information Technology, 100(6), 1684–1692.
15. Lakhno, V., Alimseitova, Zh., Kalaman, Y., Kryvoruchko, O., Desiatko, A., & Kaminskyi, S. (2023). Development of an information security system based on modeling distributed computer network vulnerability indicators of an informatization object. International Journal of Electronics and Telecommunications, 69(3), 475–483.
https://doi.org/10.24425/ijet.2023.146495
16. Lakhno, V., Malyukov, V., Malyukova, I., Akhmetov, B., Alimseitova, Zh., & Ogan, A. (2024). A neuro-game model for analyzing strategies in the dynamic interaction of participants of phishing attacks. TELKOMNIKA: Telecommunication, Computing, Electronics and Control, 22(3), 645–656. https://doi.org/10.12928/TELKOMNIKA.v22i3.25938
Additional Files
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Ержан Чонгаров

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
