Informatics and Applications

2019, Volume 13, Issue 3, pp 3-8

METHODS OF IDENTIFICATION OF "WEAK" SIGNS OF VIOLATIONS OF INFORMATION SECURITY

  • A. A. Grusho
  • N. A. Grusho
  • E. E. Timonina

Abstract

New approach of identification of "weak" signs of violations of information security is suggested. Initial information for identification of "weak" signs of violations of information security by the insider-malefactor are the observed potential purposes of the insider-malefactor. Emergence of new valuable information, in which the insider-malefactor is interested, will cause behavioral reaction of the insider-malefactor in some information spaces. Methods of searching of such reactions in various information spaces are the purpose of this work. The probability model of a reaction of an insider-malefactor in case of repeated emergence of a purpose is constructed.
It is shown that usage of many information spaces significantly increases possibilities of identification of influence of a purpose on behavior of an insider-malefactor

[+] References (14)

[+] About this article