KnE Engineering

ISSN: 2518-6841

The latest conference proceedings on all fields of engineering.

The Methodology of Detection of Internal Infringers in the Information System

Published date: Oct 08 2018

Journal Title: KnE Engineering

Issue title: Breakthrough directions of scientific research at MEPhI: Development prospects within the Strategic Academic Units

Pages: 49–54

DOI: 10.18502/keg.v3i6.2970

Authors:
Abstract:

This article provides the classification of infringers of safety of information system (IS), the methodology of construction of model of the internal infringer of safety of information system is represented, existing methods and phases of detection of internal infringers of information system are considered.

 

 

Keywords: internal infringers, information system, infringers of safety, threats to the IS, model of the internal infringer

References:

[1] Higgins, S. (2009). Information Security Management: The ISO 27000 (ISO 27K) Series, Т. 19. Digital Curation Centre (DCC).


[2] Mihalkova, A. P. and Zaycev, A. S. (2015). On the application of the Bayesian approach for early detection of internal infringers of information security. Information Technology Security, Т. 22, no. 3.


[3] Volobuev, S. V. (2000). On the systematization of the detection and analysis of leakage channels. Direct and Indirect Media/Information Security Issues, no. 1, pp. 26–37.


[4] Golubenko, A. L., Horoshko, V. A., Petrov, A. S., et al. (2006). Information technology and cybercrime. Bulletin of SNU, vol. 103, no. 9, pp. 7–10.


[5] Zaharov, A. I. (2005). Information systems: Risk assessment. Information Security, no. 6, pp. 18–19.


[6] Kovtun, I. A., Muhan, V. I., and Naboka, J. I. (2001). Types of information impacts. Information Security Issues, vol. 52, no.1, pp. 2–7.


[7] Biskup, J. (2009). Security in Computing Systems: Challenges, Approaches and Solutions: Monograph, p. 694. Berlin: Springer.

Download
HTML
Cite
Share
statistics

198 Abstract Views

174 PDF Downloads