Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 451))

Abstract

Questions of information security for today’s business, somehow using information technologies are among the most important. Probabilistic relational model complex “information system—critical documents—the staff—the attacker” are being concidered, as well as an algorithm for estimating the probability of users of information systems security by social engineering attacks. Also a method for estimating the probability of achieving critical information stored in the information system by the malefactor was presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Information security business. Studies of current trends in information security business Kaspersky Lab. http://media.kaspersky.com/pdf/IT_risk_report_Russia_2014.pdf (date of the application: 30.04.2015)

  2. Cialdini, Robert: Psychology of influence. Persuade, influence, protect.—SPb.: Peter, p. 336 (2010)

    Google Scholar 

  3. Demina, M.N.: Changes cognitive practices individual under the influence new information technologies. Sociol. Res. №6, 87–92 (2010)

    Google Scholar 

  4. Gavrilov, A.A.: Means the impact of media on public consciousness in the information society [Text]/A. Gavrilov. Young Sci. №8, 152–155 (2012)

    Google Scholar 

  5. Kanuhova, T.V.: The impact of media on mass consciousness in the information society. Basic Res. №3, 71–72 (2005)

    Google Scholar 

  6. Key Features informational message.: Modern standards of news text. Ifreestore. http://ifreestore.net/1153/24/ (date of the application: 14.01.2016)

  7. Pugachev, V.P.: Information power and democracy. Soc. Sci. Present №4, 65–77 (1999)

    Google Scholar 

  8. Distefanoa, S., Puliafitob, A.: Information dependability in distributed systems: the dependable distributed storage system. Integr. Comput.-Aided Eng. 21, 3–18 (2014)

    Google Scholar 

  9. Goo, J., M.-S., Yim, Dan, J. Kim, IEEE: 1. A path to successful management of employee security compliance: an empirical study of information security climate. Trans. Prof. Commun. 57(4), pp. 286–308 (2014). 23p

    Google Scholar 

  10. James, C.: Information systems user security: a structured model of the knowing–doing gap. Comput. Hum. Behav. 28(5), 1849–1858 (2012)

    Google Scholar 

  11. Kotenko, I.V., Stepashkin, M.V.: Systems-simulators: purpose, functions, architecture and implementation approach. Math. Univ. Instrum. T. 49(3), 3–8 (2006)

    Google Scholar 

  12. Kotenko, I.V., Yusupov, R.M.: Future research directions in the field of computer security. Data Prot. Inside № 2, 46 (2006)

    Google Scholar 

  13. Trčcek, D., Trobec, R., Pavešsić, N., Tasič, J.F.: Information systems security and human behaviour. Behav. Inf. Technol. 26(2), 113–118 (2007)

    Article  Google Scholar 

  14. Vanushecheva, O.U.: A Prototype Set of Programs to Build the Profile of Psychologically Caused by Vulnerabilities. Diplonaya work. SPb, SPbSU (2012)

    Google Scholar 

  15. Rudchenko, A.D., Yurchenko, A.V.: Management systems, business security. http://www.hse.ru/data/2015/10/05/1077104619/!-Teмa № 6_(мoя,2 лeкции).pdf (date of the application: 11.01.2016)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Artur Azarov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Azarov, A., Abramov, M., Tulupyev, A., Tulupyeva, T. (2016). Models and Algorithms for the Information System’s Users’ Protection Level Probabilistic Estimation. In: Abraham, A., Kovalev, S., Tarassov, V., Snášel, V. (eds) Proceedings of the First International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’16). Advances in Intelligent Systems and Computing, vol 451. Springer, Cham. https://doi.org/10.1007/978-3-319-33816-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-33816-3_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-33815-6

  • Online ISBN: 978-3-319-33816-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics