Skip to main content

2016 | OriginalPaper | Buchkapitel

Users’ of Information Systems Protection Analysis from Malefactor’s Social Engineering Attacks Taking into Account Malefactor’s Competence Profile

verfasst von : Artur Azarov, Maksim Abramov, Tatiana Tulupyeva, Alexander Tulupyev

Erschienen in: Biologically Inspired Cognitive Architectures (BICA) for Young Scientists

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Great attention of specialists information security given to the protection of software and hardware components of the information system, while users of the information system has been neglected and may violate the confidentiality of corporate data. The article considers the addition of the complex “information system—personnel—critical documents” with the competence profile of the attacker.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat AlHogail, A.: Design and validation of information security culture framework. Comput. Hum. Behav. 49, 567–575 (2015)CrossRef AlHogail, A.: Design and validation of information security culture framework. Comput. Hum. Behav. 49, 567–575 (2015)CrossRef
2.
Zurück zum Zitat Azarov, A.A.: Probabilistic relational models and algorithms for processing the user’s vulnerabilities profile in the analysis of security personnel information systems on social engineering attacks. Thesis for the degree of Ph.D (2013) Azarov, A.A.: Probabilistic relational models and algorithms for processing the user’s vulnerabilities profile in the analysis of security personnel information systems on social engineering attacks. Thesis for the degree of Ph.D (2013)
3.
Zurück zum Zitat Cialdini, R.: Psychology of influence. Persuade, influence, protect. SPb: Peter (2010) Cialdini, R.: Psychology of influence. Persuade, influence, protect. SPb: Peter (2010)
4.
Zurück zum Zitat Da Veiga, A., Martins, N.: Information security culture and information protection culture: a validated assessment instrument. Comput. Law Secur. Rev. 31, 243–256 (2015)CrossRef Da Veiga, A., Martins, N.: Information security culture and information protection culture: a validated assessment instrument. Comput. Law Secur. Rev. 31, 243–256 (2015)CrossRef
6.
Zurück zum Zitat Kondakci, S.: Epidemic state analysis of computers under malware attacks. Simul. Model. Pract. Theory 16(5), 571–584 (2008)CrossRef Kondakci, S.: Epidemic state analysis of computers under malware attacks. Simul. Model. Pract. Theory 16(5), 571–584 (2008)CrossRef
7.
Zurück zum Zitat Kotenko, I.V., Fedorchenko, A., Chechulin, A.A.: Integrated repository of security information for network security evaluation. J. Wireless Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2), 41–57 Kotenko, I.V., Fedorchenko, A., Chechulin, A.A.: Integrated repository of security information for network security evaluation. J. Wireless Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2), 41–57
9.
Zurück zum Zitat Proctor, R.W., Chen, J.: The role of human factors/ergonomics in the science of security. Hum. Factors 57(5), 721–727 (2015)CrossRef Proctor, R.W., Chen, J.: The role of human factors/ergonomics in the science of security. Hum. Factors 57(5), 721–727 (2015)CrossRef
10.
Zurück zum Zitat Trčcek, D., Trobec, R., Pavešsić, N., Tasič, J.F.: Information systems security and human behaviour. Behav. Inf. Technol. 113–118 (2007) Trčcek, D., Trobec, R., Pavešsić, N., Tasič, J.F.: Information systems security and human behaviour. Behav. Inf. Technol. 113–118 (2007)
11.
Zurück zum Zitat Tulupyev, A.L., Azarov, A.A., Pashchenko, A.E.: Information model user endangered social engineering attacks. Proc. SPIIRAS 2(13), 143–155 (2010) Tulupyev, A.L., Azarov, A.A., Pashchenko, A.E.: Information model user endangered social engineering attacks. Proc. SPIIRAS 2(13), 143–155 (2010)
12.
Zurück zum Zitat Tulupyeva, T.V., Tulupyev, A.L., Azarov, A.A., Pashchenko, A.E.: Psychological protection as a factor in the vulnerability of the user in the context of social engineering attacks. Proc. SPIIRAS 18, 74–92 (2011) Tulupyeva, T.V., Tulupyev, A.L., Azarov, A.A., Pashchenko, A.E.: Psychological protection as a factor in the vulnerability of the user in the context of social engineering attacks. Proc. SPIIRAS 18, 74–92 (2011)
13.
Zurück zum Zitat Yinfeng, L.: An improved RBF neural network method for information security evaluation. TELKOMNIKA Indonesian J. Electr. Eng. 12(4), 2936–2940 (2014) Yinfeng, L.: An improved RBF neural network method for information security evaluation. TELKOMNIKA Indonesian J. Electr. Eng. 12(4), 2936–2940 (2014)
14.
Zurück zum Zitat Zhang, J., Zeng, Q., Song, Y., Li, C.: Information security risk assessment of smart grid based on absorbing Markov Chain and SPA. Int. J. Emerg. Electr. Power Syst. 15(6), 527–532 (2014) Zhang, J., Zeng, Q., Song, Y., Li, C.: Information security risk assessment of smart grid based on absorbing Markov Chain and SPA. Int. J. Emerg. Electr. Power Syst. 15(6), 527–532 (2014)
Metadaten
Titel
Users’ of Information Systems Protection Analysis from Malefactor’s Social Engineering Attacks Taking into Account Malefactor’s Competence Profile
verfasst von
Artur Azarov
Maksim Abramov
Tatiana Tulupyeva
Alexander Tulupyev
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-32554-5_4