KnE Engineering
ISSN: 2518-6841
The latest conference proceedings on all fields of engineering.
The Methodology of Detection of Internal Infringers in the Information System
Published date: Oct 08 2018
Journal Title: KnE Engineering
Issue title: Breakthrough directions of scientific research at MEPhI: Development prospects within the Strategic Academic Units
Pages: 49–54
Authors:
Abstract:
This article provides the classification of infringers of safety of information system (IS), the methodology of construction of model of the internal infringer of safety of information system is represented, existing methods and phases of detection of internal infringers of information system are considered.
Keywords: internal infringers, information system, infringers of safety, threats to the IS, model of the internal infringer
References:
[1] Higgins, S. (2009). Information Security Management: The ISO 27000 (ISO 27K) Series, Т. 19. Digital Curation Centre (DCC).
[2] Mihalkova, A. P. and Zaycev, A. S. (2015). On the application of the Bayesian approach for early detection of internal infringers of information security. Information Technology Security, Т. 22, no. 3.
[3] Volobuev, S. V. (2000). On the systematization of the detection and analysis of leakage channels. Direct and Indirect Media/Information Security Issues, no. 1, pp. 26–37.
[4] Golubenko, A. L., Horoshko, V. A., Petrov, A. S., et al. (2006). Information technology and cybercrime. Bulletin of SNU, vol. 103, no. 9, pp. 7–10.
[5] Zaharov, A. I. (2005). Information systems: Risk assessment. Information Security, no. 6, pp. 18–19.
[6] Kovtun, I. A., Muhan, V. I., and Naboka, J. I. (2001). Types of information impacts. Information Security Issues, vol. 52, no.1, pp. 2–7.
[7] Biskup, J. (2009). Security in Computing Systems: Challenges, Approaches and Solutions: Monograph, p. 694. Berlin: Springer.