Fuzzy Systems and Soft Computing
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Guidelines for authors
Submit a manuscript

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Fuzzy Systems and Soft Computing:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Fuzzy Systems and Soft Computing, 2015, Volume 10, Issue 2, Pages 209–221 (Mi fssc21)  

The use of probabilistic relational models of complex "critical documents - information system - the user - the attacker" for the analysis of security of information systems users from social engineering attacks

A. A. Azarovab, M. V. Abramova, T. V. Tulupyevaca, A. A. Filchenkovd

a St. Petersburg Institute for Informatics and Automation of RAS, St. Petersburg
b Institute for High-Hume Technologies in Social Computing, Sholokhov University, Moscow
c St. Petersburg State University, St. Petersburg
d ITMO University, St. Petersburg
References:
Abstract: The article describes a model user profiles and vulnerability, the attacker model and sotsiinzhenernyh attack model of information systems and software and hardware devices. Trends in the development of modern business often require confidentiality of corporate information leakage which may result in significant financial losses. Leakage of confidential information may be associated with problems of insecurity and the software and hardware components of the information system of the organization and with the users of the system. Leaks of confidential information from the users of information systems can be carried out for several reasons: because of social engineering attacks influences attacker when a user misled and the attacker receives the required confidential information, as well as due to insider attacks the users of information systems. Insider attack users of information systems can be implemented with the involvement of social engineering attacks influences, but in this case the source of social engineering attacks impact will be located within the organization.
Keywords: probabilistic relational model, information security, social engineering attacks, protecting the user.
Funding agency Grant number
Russian Foundation for Basic Research 15-01-09001_a
Received: 13.12.2014
Revised: 02.02.2015
Bibliographic databases:
Document Type: Article
UDC: 614.8+002.6:004.89
Language: Russian
Citation: A. A. Azarov, M. V. Abramov, T. V. Tulupyeva, A. A. Filchenkov, “The use of probabilistic relational models of complex "critical documents - information system - the user - the attacker" for the analysis of security of information systems users from social engineering attacks”, Fuzzy Systems and Soft Computing, 10:2 (2015), 209–221
Citation in format AMSBIB
\Bibitem{AzaAbrTul15}
\by A.~A.~Azarov, M.~V.~Abramov, T.~V.~Tulupyeva, A.~A.~Filchenkov
\paper The use of probabilistic relational models of complex "critical documents - information system - the user - the attacker" for the analysis of security of information systems users from social engineering attacks
\jour Fuzzy Systems and Soft Computing
\yr 2015
\vol 10
\issue 2
\pages 209--221
\mathnet{http://mi.mathnet.ru/fssc21}
\elib{https://elibrary.ru/item.asp?id=25016370}
Linking options:
  • https://www.mathnet.ru/eng/fssc21
  • https://www.mathnet.ru/eng/fssc/v10/i2/p209
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Fuzzy Systems and Soft  Computing
    Statistics & downloads:
    Abstract page:211
    Full-text PDF :123
    References:74
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2025