|
advertisement |
|
|
|
|
|
|
Instruments and Systems: Monitoring, Control, and Diagnostics Annotation << Back
New approaches to modeling the internal infringerthe information security |
V.Y. KARPYCHEVV.M. SYCHEVYU.V. MININ
The urgency of research of influence of internal infringers on information security support is justified. Authoring determinations are
given concepts “unreliability” and “unloyalty”, and also their correspondence to existing determinations in information security field.
The approach to development of the formalized model of the interior infringer of information security is justified and considered.
The developed models of vulnerability and unloyalty staff describe objective and subjective factors of violation of information security
the specific employee of the organisation and can be used for the analysis of a potential possibility of implementation by it of
threats. For exposition of some parametres, in connection with impossibility of their quantitative estimation, the means of the theory
of unsharp sets is used.
The data domain analysis has allowed to offer an information model of the interior infringer of information security for which
development methodology IDEF1X is used.
Keywords: information security, model, staff, the infringer, insider, unreliability, unloyalty, vulnerability, a linguistic variable.
Contacts: E-mail: zi@bstu.ru
Pp. 32-39. |
|
|
|
Last news:
Выставки по автоматизации и электронике «ПТА-Урал 2018» и «Электроника-Урал 2018» состоятся в Екатеринбурге Открыта электронная регистрация на выставку Дефектоскопия / NDT St. Petersburg Открыта регистрация на 9-ю Международную научно-практическую конференцию «Строительство и ремонт скважин — 2018» ExpoElectronica и ElectronTechExpo 2018: рост площади экспозиции на 19% и новые формы контент-программы Тематика и состав экспозиции РЭП на выставке "ChipEXPO - 2018" |