RUS  ENG
Full version
JOURNALS // Informatics and Automation // Archive

Tr. SPIIRAN, 2012 Issue 21, Pages 21–40 (Mi trspy521)

This article is cited in 5 papers

Software prototype for information systems’ personnel's protection analysis based on the fragment of user’s vulnerabilities profile.

A. A. Azarovab, T. V. Tulupyevaab, A. L. Tulupyevab

a St. Petersburg State University, Department of Mathematics and Mechanics
b St. Petersburg Institute for Informatics and Automation of RAS

Abstract: Complex corporate information systems are widely distributed in the modern world. Development, support and protection of similar systems require a significant amount of time and resources, besides only highly skilled experts can be engaged in similar systems. Information stored in such information systems, has huge value for the owners of systems therefore considerable efforts are spent for creation systems of protection of such systems from various threats of safety. The purpose of this article is the combination of an indistinct and likelihood approach to an assessment of security of the user in relation to attacking actions of the malefactor, and the actions of rather elementary character ("one movement") aimed at "elementary" vulnerabilities of the user influence on which leads directly to any action of the user are considered.

Keywords: socio-engineering attack, informational system, user, user's vulnerabilities profile.

UDC: 614.8+002.6:004.89

Received: 13.06.2012



© Steklov Math. Inst. of RAS, 2024