The use of probabilistic relational models of complex "critical documents - information system - the user - the attacker" for the analysis of security of information systems users from social engineering attacks
Nečetkie sistemy i mâgkie vyčisleniâ, Tome 10 (2015) no. 2, pp. 209-221

Voir la notice de l'article provenant de la source Math-Net.Ru

The article describes a model user profiles and vulnerability, the attacker model and sotsiinzhenernyh attack model of information systems and software and hardware devices. Trends in the development of modern business often require confidentiality of corporate information leakage which may result in significant financial losses. Leakage of confidential information may be associated with problems of insecurity and the software and hardware components of the information system of the organization and with the users of the system. Leaks of confidential information from the users of information systems can be carried out for several reasons: because of social engineering attacks influences attacker when a user misled and the attacker receives the required confidential information, as well as due to insider attacks the users of information systems. Insider attack users of information systems can be implemented with the involvement of social engineering attacks influences, but in this case the source of social engineering attacks impact will be located within the organization.
Keywords: probabilistic relational model, information security, social engineering attacks, protecting the user.
@article{FSSC_2015_10_2_a4,
     author = {A. A. Azarov and M. V. Abramov and T. V. Tulupyeva and A. A. Filchenkov},
     title = {The use of probabilistic relational models of complex "critical documents - information system - the user - the attacker" for the analysis of security of information systems users from social engineering attacks},
     journal = {Ne\v{c}etkie sistemy i m\^agkie vy\v{c}isleni\^a},
     pages = {209--221},
     publisher = {mathdoc},
     volume = {10},
     number = {2},
     year = {2015},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/FSSC_2015_10_2_a4/}
}
TY  - JOUR
AU  - A. A. Azarov
AU  - M. V. Abramov
AU  - T. V. Tulupyeva
AU  - A. A. Filchenkov
TI  - The use of probabilistic relational models of complex "critical documents - information system - the user - the attacker" for the analysis of security of information systems users from social engineering attacks
JO  - Nečetkie sistemy i mâgkie vyčisleniâ
PY  - 2015
SP  - 209
EP  - 221
VL  - 10
IS  - 2
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/FSSC_2015_10_2_a4/
LA  - ru
ID  - FSSC_2015_10_2_a4
ER  - 
%0 Journal Article
%A A. A. Azarov
%A M. V. Abramov
%A T. V. Tulupyeva
%A A. A. Filchenkov
%T The use of probabilistic relational models of complex "critical documents - information system - the user - the attacker" for the analysis of security of information systems users from social engineering attacks
%J Nečetkie sistemy i mâgkie vyčisleniâ
%D 2015
%P 209-221
%V 10
%N 2
%I mathdoc
%U http://geodesic.mathdoc.fr/item/FSSC_2015_10_2_a4/
%G ru
%F FSSC_2015_10_2_a4
A. A. Azarov; M. V. Abramov; T. V. Tulupyeva; A. A. Filchenkov. The use of probabilistic relational models of complex "critical documents - information system - the user - the attacker" for the analysis of security of information systems users from social engineering attacks. Nečetkie sistemy i mâgkie vyčisleniâ, Tome 10 (2015) no. 2, pp. 209-221. http://geodesic.mathdoc.fr/item/FSSC_2015_10_2_a4/