Abstract
Questions of information security for today’s business, somehow using information technologies are among the most important. Probabilistic relational model complex “information system—critical documents—the staff—the attacker” are being concidered, as well as an algorithm for estimating the probability of users of information systems security by social engineering attacks. Also a method for estimating the probability of achieving critical information stored in the information system by the malefactor was presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Information security business. Studies of current trends in information security business Kaspersky Lab. http://media.kaspersky.com/pdf/IT_risk_report_Russia_2014.pdf (date of the application: 30.04.2015)
Cialdini, Robert: Psychology of influence. Persuade, influence, protect.—SPb.: Peter, p. 336 (2010)
Demina, M.N.: Changes cognitive practices individual under the influence new information technologies. Sociol. Res. №6, 87–92 (2010)
Gavrilov, A.A.: Means the impact of media on public consciousness in the information society [Text]/A. Gavrilov. Young Sci. №8, 152–155 (2012)
Kanuhova, T.V.: The impact of media on mass consciousness in the information society. Basic Res. №3, 71–72 (2005)
Key Features informational message.: Modern standards of news text. Ifreestore. http://ifreestore.net/1153/24/ (date of the application: 14.01.2016)
Pugachev, V.P.: Information power and democracy. Soc. Sci. Present №4, 65–77 (1999)
Distefanoa, S., Puliafitob, A.: Information dependability in distributed systems: the dependable distributed storage system. Integr. Comput.-Aided Eng. 21, 3–18 (2014)
Goo, J., M.-S., Yim, Dan, J. Kim, IEEE: 1. A path to successful management of employee security compliance: an empirical study of information security climate. Trans. Prof. Commun. 57(4), pp. 286–308 (2014). 23p
James, C.: Information systems user security: a structured model of the knowing–doing gap. Comput. Hum. Behav. 28(5), 1849–1858 (2012)
Kotenko, I.V., Stepashkin, M.V.: Systems-simulators: purpose, functions, architecture and implementation approach. Math. Univ. Instrum. T. 49(3), 3–8 (2006)
Kotenko, I.V., Yusupov, R.M.: Future research directions in the field of computer security. Data Prot. Inside № 2, 46 (2006)
Trčcek, D., Trobec, R., Pavešsić, N., Tasič, J.F.: Information systems security and human behaviour. Behav. Inf. Technol. 26(2), 113–118 (2007)
Vanushecheva, O.U.: A Prototype Set of Programs to Build the Profile of Psychologically Caused by Vulnerabilities. Diplonaya work. SPb, SPbSU (2012)
Rudchenko, A.D., Yurchenko, A.V.: Management systems, business security. http://www.hse.ru/data/2015/10/05/1077104619/!-Teмa № 6_(мoя,2 лeкции).pdf (date of the application: 11.01.2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Azarov, A., Abramov, M., Tulupyev, A., Tulupyeva, T. (2016). Models and Algorithms for the Information System’s Users’ Protection Level Probabilistic Estimation. In: Abraham, A., Kovalev, S., Tarassov, V., Snášel, V. (eds) Proceedings of the First International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’16). Advances in Intelligent Systems and Computing, vol 451. Springer, Cham. https://doi.org/10.1007/978-3-319-33816-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-33816-3_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-33815-6
Online ISBN: 978-3-319-33816-3
eBook Packages: EngineeringEngineering (R0)