The Methodology of Detection of Internal Infringers in the Information System

Abstract

This article provides the classification of infringers of safety of information system (IS), the methodology of construction of model of the internal infringer of safety of information system is represented, existing methods and phases of detection of internal infringers of information system are considered.


 


 


Keywords: internal infringers, information system, infringers of safety, threats to the IS, model of the internal infringer

References
[1] Higgins, S. (2009). Information Security Management: The ISO 27000 (ISO 27K) Series, Т. 19. Digital Curation Centre (DCC).


[2] Mihalkova, A. P. and Zaycev, A. S. (2015). On the application of the Bayesian approach for early detection of internal infringers of information security. Information Technology Security, Т. 22, no. 3.


[3] Volobuev, S. V. (2000). On the systematization of the detection and analysis of leakage channels. Direct and Indirect Media/Information Security Issues, no. 1, pp. 26–37.


[4] Golubenko, A. L., Horoshko, V. A., Petrov, A. S., et al. (2006). Information technology and cybercrime. Bulletin of SNU, vol. 103, no. 9, pp. 7–10.


[5] Zaharov, A. I. (2005). Information systems: Risk assessment. Information Security, no. 6, pp. 18–19.


[6] Kovtun, I. A., Muhan, V. I., and Naboka, J. I. (2001). Types of information impacts. Information Security Issues, vol. 52, no.1, pp. 2–7.


[7] Biskup, J. (2009). Security in Computing Systems: Challenges, Approaches and Solutions: Monograph, p. 694. Berlin: Springer.