Please use this identifier to cite or link to this item:
https://dspace.ncfu.ru/handle/20.500.12258/25234Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Mandritsa, I. V. | - |
| dc.contributor.author | Мандрица, И. В. | - |
| dc.contributor.author | Antonov, V. V. | - |
| dc.contributor.author | Антонов, В. В. | - |
| dc.contributor.author | Madi, S. L. | - |
| dc.contributor.author | Мади, С. Л. | - |
| dc.date.accessioned | 2023-09-07T13:39:10Z | - |
| dc.date.available | 2023-09-07T13:39:10Z | - |
| dc.date.issued | 2023 | - |
| dc.identifier.citation | Mandritsa, I.V., Antonov, V.V., Madi, S.L. Factors of a Mathematical Model for Detection an Internal Attacker of the Company // Lecture Notes in Networks and Systems. - 2023. - 702 LNNS, pp. 270-276. - DOI: 10.1007/978-3-031-34127-4_26 | ru |
| dc.identifier.uri | http://hdl.handle.net/20.500.12258/25234 | - |
| dc.description.abstract | For commercial organizations, the issue of tolerance and loyalty of employees is always relevant, since it is closely related to the issue of leakage of trade secrets from those who have access to it. Thus, the identification of an internal violator is becoming increasingly relevant in the development of information processing technologies, when in the information systems of the organization the most vulnerable place remains a person. An employee who processes information and has full access to it, becomes the target of an attacker, and can also be an intruder and become a source of leakage of confidential information. Analysis of metadata about the current psycho-emotional state of the employee with the help of digital technologies allows you to make an assumption about his current and future emotional state, readiness to honestly perform work and predict the likelihood of this employee or violate the law on trade secrets. Thus, the security department of the company, having collected metadata and analyzing them, is able to prevent the threat and get before the leak a certain probability of malicious intent for each employee, and this will increase the security of information. | ru |
| dc.language.iso | en | ru |
| dc.relation.ispartofseries | Lecture Notes in Networks and Systems | - |
| dc.subject | Information security | ru |
| dc.subject | Probability of malicious intent | ru |
| dc.subject | Internal violator | ru |
| dc.subject | Metadata collection | ru |
| dc.title | Factors of a Mathematical Model for Detection an Internal Attacker of the Company | ru |
| dc.type | Статья | ru |
| vkr.inst | Институт цифрового развития | ru |
| Appears in Collections: | Статьи, проиндексированные в SCOPUS, WOS | |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| scopusresults 2703 .pdf Restricted Access | 132.14 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.