Systems and Means of Informatics
2020, Volume 30, Issue 2, pp 31-42
VALUATION AND PROTECTION OF INSIDER INFORMATION
- A. S. Kabanov
- A. A. Vodolazhenko
Abstract
Different aspects of introduction of means to counteract insider activity are considered. The pragmatic approach to assessing the necessity and cost of implementing countermeasures to insider activity of a certain organization is shown. The condition of the economic feasibility of introducing measures to counteract insider activities is given, the approaches to evaluating insider information are proposed, and the basic conclusions are formulated. The article is analytical and can be useful for heads of information security services, teachers, and students.
[+] References (10)
- Diachenko O. 13.01.2012. Kak zashchitit'sya ot insaydera [How to protect yourself from an insider]. Available at: http://www.prostobankir.com.ua/it/stati/ kak_zaschititsya_ot_insaydera (accessed March 20, 2020).
- Cohen, F. 23.06.2015. Netekhnicheskie metody protivodeystviya insayderskim ugrozam [Nontechnical methods of countering insider threats]. Available at: https:// www.securitylab.ru/analytics/473402.php (accessed March 20, 2020).
- Kabanov, A. S., A.B. Los, and A.V. Suroev. 2015. Metody sotsial'noy inzhenerii v sfere informatsionnoy bezopasnosti i protivodeystvie im [Methods of social engineering in the sphere of information safety and counteraction thereto]. Rossiyskiy sledovatel' [Russian Investigator] 18:32-37.
- Kabanov, A. S., and A. B. Los. 2016. Prichiny, profilaktika i metody protivodeystviya insayderskoy deyatel'nosti [Reasons, prevention and methods of counteraction of insider activity]. Bezopasnost' biznesa [Business Security] 3:28-35.
- Gajkovich, V.Y., and D.V. Ershov. 1995. Osnovy bezopasnosti informatsionnykh tekhnologiy [Fundamentals of information technology security]. Moscow: MIFI. 96 p.
- Naumov, V.N., and D. V. Kucherenko. 2019. Issledovanie strukturnoy slozhnosti in- frastruktury gosudarstvennykh informatsionnykh sistem metodami analiza sotsial'nykh grafov [Study of the structural complexity of the infrastructure of state information systems by the analysis of social graphs]. Sovremennye naukoemkie tekhnologii [Modern High Technologies] 2:114-122.
- Sharamko, M. M. 2016. Vnutrenniy kontrol': metodologiya, sistema i protsessy [Internal control: Methodology, system and processes]. Moscow: Rusayns. 228 p.
- Grusho, A. A., and E. E. Timonina. 1996. Teoreticheskie osnovy zashchity informatsii [Theoretical bases of information security]. Moscow: Yakhsmen. 192 p.
- Volkova, V. N. 2016. Teoriya informatsionnykh protsessov i sistem [Theory of information processes and systems]. Moscow: Yurayt. 502 p.
- Lazebnik, V. M. 2008. Ekonomicheskaya kibernetika [Economic cybernetics]. Available at: https://studfile.net/preview/1100363/ (accessed March 20, 2020).
[+] About this article
Title
VALUATION AND PROTECTION OF INSIDER INFORMATION
Journal
Systems and Means of Informatics
Volume 30, Issue 2, pp 31-42
Cover Date
2020-06-30
DOI
10.14357/08696527200204
Print ISSN
0869-6527
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
insider; insider activity; value of insider information
Authors
A. S. Kabanov and A. A. Vodolazhenko
Author Affiliations
National Research University Higher School of Economics, 34 Tallinskaya Str.,
Moscow 123458, Russian Federation
|