RUS  ENG
Full version
JOURNALS // Informatika i Ee Primeneniya [Informatics and its Applications] // Archive

Inform. Primen., 2019 Volume 13, Issue 3, Pages 3–8 (Mi ia602)

This article is cited in 3 papers

Methods of identification of “weak” signs of violations of information security

A. A. Grusho, N. A. Grusho, E. E. Timonina

Institute of Informatics Problems, Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation

Abstract: New approach of identification of “weak” signs of violations of information security is suggested. Initial information for identification of “weak” signs of violations of information security by the insider-malefactor are the observed potential purposes of the insider-malefactor. Emergence of new valuable information, in which the insider-malefactor is interested, will cause behavioral reaction of the insider-malefactor in some information spaces. Methods of searching of such reactions in various information spaces are the purpose of this work. The probability model of a reaction of an insider-malefactor in case of repeated emergence of a purpose is constructed. It is shown that usage of many information spaces significantly increases possibilities of identification of influence of a purpose on behavior of an insider-malefactor.

Keywords: information security, information spaces, behavioral signs of a violator of information security.

Received: 07.07.2019

DOI: 10.14357/19922264190301



© Steklov Math. Inst. of RAS, 2026