Abstract:
Complex corporate information systems are widely distributed in the modern world. Development, support and protection of similar systems require a significant amount of time and resources, besides only highly skilled experts can be engaged in similar systems. Information stored in such information systems, has huge value for the owners of systems therefore considerable efforts are spent for creation systems of protection of such systems from various threats of safety. The purpose of this article is the combination of an indistinct and likelihood approach to an assessment of security of the user in relation to attacking actions of the malefactor, and the actions of rather elementary character ("one movement") aimed at "elementary" vulnerabilities of the user influence on which leads directly to any action of the user are considered.