|
This article is cited in 3 scientific papers (total in 3 papers)
Methods of identification of “weak” signs of violations of information security
A. A. Grusho, N. A. Grusho, E. E. Timonina Institute of Informatics Problems, Federal Research Center “Computer Science and Control” of the Russian
Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
Abstract:
New approach of identification of “weak” signs of violations of information security is
suggested. Initial information for identification of “weak” signs of violations of information security by
the insider-malefactor are the observed potential purposes of the insider-malefactor.
Emergence of new valuable information, in which the insider-malefactor is interested, will cause
behavioral reaction of the insider-malefactor in some information spaces. Methods of searching of
such reactions in various information spaces are the purpose of this work.
The probability model of a reaction of an insider-malefactor in case of repeated emergence of
a purpose is constructed. It is shown that usage of many information spaces significantly increases
possibilities of identification of influence of a purpose on behavior of an insider-malefactor.
Keywords:
information security, information spaces, behavioral signs of a violator of information security.
Received: 07.07.2019
Citation:
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Methods of identification of “weak” signs of violations of information security”, Inform. Primen., 13:3 (2019), 3–8
Linking options:
https://www.mathnet.ru/eng/ia602 https://www.mathnet.ru/eng/ia/v13/i3/p3
|
Statistics & downloads: |
Abstract page: | 321 | Full-text PDF : | 91 | References: | 39 |
|