Skip to main content

Users’ of Information Systems Protection Analysis from Malefactor’s Social Engineering Attacks Taking into Account Malefactor’s Competence Profile

  • Conference paper
  • First Online:
Biologically Inspired Cognitive Architectures (BICA) for Young Scientists

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 449))

Abstract

Great attention of specialists information security given to the protection of software and hardware components of the information system, while users of the information system has been neglected and may violate the confidentiality of corporate data. The article considers the addition of the complex “information system—personnel—critical documents” with the competence profile of the attacker.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. AlHogail, A.: Design and validation of information security culture framework. Comput. Hum. Behav. 49, 567–575 (2015)

    Article  Google Scholar 

  2. Azarov, A.A.: Probabilistic relational models and algorithms for processing the user’s vulnerabilities profile in the analysis of security personnel information systems on social engineering attacks. Thesis for the degree of Ph.D (2013)

    Google Scholar 

  3. Cialdini, R.: Psychology of influence. Persuade, influence, protect. SPb: Peter (2010)

    Google Scholar 

  4. Da Veiga, A., Martins, N.: Information security culture and information protection culture: a validated assessment instrument. Comput. Law Secur. Rev. 31, 243–256 (2015)

    Article  Google Scholar 

  5. Information of Security Business: Studies of current trends in area of information security of business. Retrieved from Kaspersky Lab: http://media.kaspersky.com/pdf/IT_risk_report_Russia_2014.pdf, 30 April 2015

  6. Kondakci, S.: Epidemic state analysis of computers under malware attacks. Simul. Model. Pract. Theory 16(5), 571–584 (2008)

    Article  Google Scholar 

  7. Kotenko, I.V., Fedorchenko, A., Chechulin, A.A.: Integrated repository of security information for network security evaluation. J. Wireless Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2), 41–57

    Google Scholar 

  8. Losses from Cybercrime Continue to Grow: Retrieved from http://www8.hp.com/ru/ru/software-solutions/ponemon-cyber-security-report/index.html, 4 Mar 2015

  9. Proctor, R.W., Chen, J.: The role of human factors/ergonomics in the science of security. Hum. Factors 57(5), 721–727 (2015)

    Article  Google Scholar 

  10. Trčcek, D., Trobec, R., Pavešsić, N., Tasič, J.F.: Information systems security and human behaviour. Behav. Inf. Technol. 113–118 (2007)

    Google Scholar 

  11. Tulupyev, A.L., Azarov, A.A., Pashchenko, A.E.: Information model user endangered social engineering attacks. Proc. SPIIRAS 2(13), 143–155 (2010)

    Google Scholar 

  12. Tulupyeva, T.V., Tulupyev, A.L., Azarov, A.A., Pashchenko, A.E.: Psychological protection as a factor in the vulnerability of the user in the context of social engineering attacks. Proc. SPIIRAS 18, 74–92 (2011)

    Google Scholar 

  13. Yinfeng, L.: An improved RBF neural network method for information security evaluation. TELKOMNIKA Indonesian J. Electr. Eng. 12(4), 2936–2940 (2014)

    Google Scholar 

  14. Zhang, J., Zeng, Q., Song, Y., Li, C.: Information security risk assessment of smart grid based on absorbing Markov Chain and SPA. Int. J. Emerg. Electr. Power Syst. 15(6), 527–532 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Artur Azarov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Azarov, A., Abramov, M., Tulupyeva, T., Tulupyev, A. (2016). Users’ of Information Systems Protection Analysis from Malefactor’s Social Engineering Attacks Taking into Account Malefactor’s Competence Profile. In: Samsonovich, A., Klimov, V., Rybina, G. (eds) Biologically Inspired Cognitive Architectures (BICA) for Young Scientists . Advances in Intelligent Systems and Computing, vol 449. Springer, Cham. https://doi.org/10.1007/978-3-319-32554-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32554-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32553-8

  • Online ISBN: 978-3-319-32554-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics