Trudy SPIIRAN
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Informatics and Automation:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Trudy SPIIRAN, 2013, Issue 24, Pages 54–65 (Mi trspy588)  

This article is cited in 1 scientific paper (total in 1 paper)

Information systems’ user’s protection analysis on the basis of the graphic models containing user’s vulnerabilities profile.

A. A. Azarov

Saint-Petersburg State University
Full-text PDF (663 kB) Citations (1)
References:
Abstract: The problem of critical information protection is now one of the most actual in in-formation technologies though it is necessary to recognize that, from the historical point of view, closely related to it problems arose much earlier — probably, at the same time with writing emergence. The standard approach to the solution of these problems consists in development, diversification and complication of applied technical measures of safety. Thus possibilities of technical attacks to systems are minimized. At the same time, each protected information system has the authorized users who work at the lawful bases in it and often have legal access to confidential information. The purpose of this article is creation of an analysis algorithm of resistance of users of information systems from socio-engineering attacks taking into account a profile of vulnerabilities of the user.
Keywords: socio-engineering attack, informational system, user, user's vulnerabilities profile, user’s resistance.
Received: 15.02.2013
Document Type: Article
Language: Russian
Citation: A. A. Azarov, “Information systems’ user’s protection analysis on the basis of the graphic models containing user’s vulnerabilities profile.”, Tr. SPIIRAN, 24 (2013), 54–65
Citation in format AMSBIB
\Bibitem{Aza13}
\by A.~A.~Azarov
\paper Information systems’ user’s protection analysis on the basis of the graphic models containing user’s vulnerabilities profile.
\jour Tr. SPIIRAN
\yr 2013
\vol 24
\pages 54--65
\mathnet{http://mi.mathnet.ru/trspy588}
Linking options:
  • https://www.mathnet.ru/eng/trspy588
  • https://www.mathnet.ru/eng/trspy/v24/p54
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Informatics and Automation
    Statistics & downloads:
    Abstract page:524
    Full-text PDF :74
    References:44
    First page:1
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024