Abstract
Great attention of specialists information security given to the protection of software and hardware components of the information system, while users of the information system has been neglected and may violate the confidentiality of corporate data. The article considers the addition of the complex “information system—personnel—critical documents” with the competence profile of the attacker.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
AlHogail, A.: Design and validation of information security culture framework. Comput. Hum. Behav. 49, 567–575 (2015)
Azarov, A.A.: Probabilistic relational models and algorithms for processing the user’s vulnerabilities profile in the analysis of security personnel information systems on social engineering attacks. Thesis for the degree of Ph.D (2013)
Cialdini, R.: Psychology of influence. Persuade, influence, protect. SPb: Peter (2010)
Da Veiga, A., Martins, N.: Information security culture and information protection culture: a validated assessment instrument. Comput. Law Secur. Rev. 31, 243–256 (2015)
Information of Security Business: Studies of current trends in area of information security of business. Retrieved from Kaspersky Lab: http://media.kaspersky.com/pdf/IT_risk_report_Russia_2014.pdf, 30 April 2015
Kondakci, S.: Epidemic state analysis of computers under malware attacks. Simul. Model. Pract. Theory 16(5), 571–584 (2008)
Kotenko, I.V., Fedorchenko, A., Chechulin, A.A.: Integrated repository of security information for network security evaluation. J. Wireless Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2), 41–57
Losses from Cybercrime Continue to Grow: Retrieved from http://www8.hp.com/ru/ru/software-solutions/ponemon-cyber-security-report/index.html, 4 Mar 2015
Proctor, R.W., Chen, J.: The role of human factors/ergonomics in the science of security. Hum. Factors 57(5), 721–727 (2015)
Trčcek, D., Trobec, R., Pavešsić, N., Tasič, J.F.: Information systems security and human behaviour. Behav. Inf. Technol. 113–118 (2007)
Tulupyev, A.L., Azarov, A.A., Pashchenko, A.E.: Information model user endangered social engineering attacks. Proc. SPIIRAS 2(13), 143–155 (2010)
Tulupyeva, T.V., Tulupyev, A.L., Azarov, A.A., Pashchenko, A.E.: Psychological protection as a factor in the vulnerability of the user in the context of social engineering attacks. Proc. SPIIRAS 18, 74–92 (2011)
Yinfeng, L.: An improved RBF neural network method for information security evaluation. TELKOMNIKA Indonesian J. Electr. Eng. 12(4), 2936–2940 (2014)
Zhang, J., Zeng, Q., Song, Y., Li, C.: Information security risk assessment of smart grid based on absorbing Markov Chain and SPA. Int. J. Emerg. Electr. Power Syst. 15(6), 527–532 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Azarov, A., Abramov, M., Tulupyeva, T., Tulupyev, A. (2016). Users’ of Information Systems Protection Analysis from Malefactor’s Social Engineering Attacks Taking into Account Malefactor’s Competence Profile. In: Samsonovich, A., Klimov, V., Rybina, G. (eds) Biologically Inspired Cognitive Architectures (BICA) for Young Scientists . Advances in Intelligent Systems and Computing, vol 449. Springer, Cham. https://doi.org/10.1007/978-3-319-32554-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-32554-5_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32553-8
Online ISBN: 978-3-319-32554-5
eBook Packages: EngineeringEngineering (R0)