Informatika i Ee Primeneniya [Informatics and its Applications]
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Inform. Primen.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Informatika i Ee Primeneniya [Informatics and its Applications], 2019, Volume 13, Issue 3, Pages 3–8
DOI: https://doi.org/10.14357/19922264190301
(Mi ia602)
 

This article is cited in 3 scientific papers (total in 3 papers)

Methods of identification of “weak” signs of violations of information security

A. A. Grusho, N. A. Grusho, E. E. Timonina

Institute of Informatics Problems, Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
Full-text PDF (160 kB) Citations (3)
References:
Abstract: New approach of identification of “weak” signs of violations of information security is suggested. Initial information for identification of “weak” signs of violations of information security by the insider-malefactor are the observed potential purposes of the insider-malefactor. Emergence of new valuable information, in which the insider-malefactor is interested, will cause behavioral reaction of the insider-malefactor in some information spaces. Methods of searching of such reactions in various information spaces are the purpose of this work. The probability model of a reaction of an insider-malefactor in case of repeated emergence of a purpose is constructed. It is shown that usage of many information spaces significantly increases possibilities of identification of influence of a purpose on behavior of an insider-malefactor.
Keywords: information security, information spaces, behavioral signs of a violator of information security.
Funding agency Grant number
Russian Foundation for Basic Research 18-07-00274_а
The paper was partially supported by the Russian Foundation for Basic Research (project 18-07-00274-a).
Received: 07.07.2019
Document Type: Article
Language: Russian
Citation: A. A. Grusho, N. A. Grusho, E. E. Timonina, “Methods of identification of “weak” signs of violations of information security”, Inform. Primen., 13:3 (2019), 3–8
Citation in format AMSBIB
\Bibitem{GruGruTim19}
\by A.~A.~Grusho, N.~A.~Grusho, E.~E.~Timonina
\paper Methods of identification of~``weak'' signs of~violations of~information security
\jour Inform. Primen.
\yr 2019
\vol 13
\issue 3
\pages 3--8
\mathnet{http://mi.mathnet.ru/ia602}
\crossref{https://doi.org/10.14357/19922264190301}
Linking options:
  • https://www.mathnet.ru/eng/ia602
  • https://www.mathnet.ru/eng/ia/v13/i3/p3
  • This publication is cited in the following 3 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Информатика и её применения
    Statistics & downloads:
    Abstract page:321
    Full-text PDF :91
    References:39
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024