Trudy SPIIRAN
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Informatics and Automation:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Trudy SPIIRAN, 2012, Issue 21, Pages 21–40 (Mi trspy521)  

This article is cited in 5 scientific papers (total in 5 papers)

Software prototype for information systems’ personnel's protection analysis based on the fragment of user’s vulnerabilities profile.

A. A. Azarovab, T. V. Tulupyevaab, A. L. Tulupyevab

a St. Petersburg State University, Department of Mathematics and Mechanics
b St. Petersburg Institute for Informatics and Automation of RAS
References:
Abstract: Complex corporate information systems are widely distributed in the modern world. Development, support and protection of similar systems require a significant amount of time and resources, besides only highly skilled experts can be engaged in similar systems. Information stored in such information systems, has huge value for the owners of systems therefore considerable efforts are spent for creation systems of protection of such systems from various threats of safety. The purpose of this article is the combination of an indistinct and likelihood approach to an assessment of security of the user in relation to attacking actions of the malefactor, and the actions of rather elementary character ("one movement") aimed at "elementary" vulnerabilities of the user influence on which leads directly to any action of the user are considered.
Keywords: socio-engineering attack, informational system, user, user's vulnerabilities profile.
Received: 13.06.2012
Document Type: Article
UDC: 614.8+002.6:004.89
Language: Russian
Citation: A. A. Azarov, T. V. Tulupyeva, A. L. Tulupyev, “Software prototype for information systems’ personnel's protection analysis based on the fragment of user’s vulnerabilities profile.”, Tr. SPIIRAN, 21 (2012), 21–40
Citation in format AMSBIB
\Bibitem{AzaTulTul12}
\by A.~A.~Azarov, T.~V.~Tulupyeva, A.~L.~Tulupyev
\paper Software prototype for information systems’ personnel's protection analysis based on the fragment of user’s vulnerabilities profile.
\jour Tr. SPIIRAN
\yr 2012
\vol 21
\pages 21--40
\mathnet{http://mi.mathnet.ru/trspy521}
Linking options:
  • https://www.mathnet.ru/eng/trspy521
  • https://www.mathnet.ru/eng/trspy/v21/p21
  • This publication is cited in the following 5 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Informatics and Automation
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2025