Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/20.500.12258/25234
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMandritsa, I. V.-
dc.contributor.authorМандрица, И. В.-
dc.contributor.authorAntonov, V. V.-
dc.contributor.authorАнтонов, В. В.-
dc.contributor.authorMadi, S. L.-
dc.contributor.authorМади, С. Л.-
dc.date.accessioned2023-09-07T13:39:10Z-
dc.date.available2023-09-07T13:39:10Z-
dc.date.issued2023-
dc.identifier.citationMandritsa, I.V., Antonov, V.V., Madi, S.L. Factors of a Mathematical Model for Detection an Internal Attacker of the Company // Lecture Notes in Networks and Systems. - 2023. - 702 LNNS, pp. 270-276. - DOI: 10.1007/978-3-031-34127-4_26ru
dc.identifier.urihttp://hdl.handle.net/20.500.12258/25234-
dc.description.abstractFor commercial organizations, the issue of tolerance and loyalty of employees is always relevant, since it is closely related to the issue of leakage of trade secrets from those who have access to it. Thus, the identification of an internal violator is becoming increasingly relevant in the development of information processing technologies, when in the information systems of the organization the most vulnerable place remains a person. An employee who processes information and has full access to it, becomes the target of an attacker, and can also be an intruder and become a source of leakage of confidential information. Analysis of metadata about the current psycho-emotional state of the employee with the help of digital technologies allows you to make an assumption about his current and future emotional state, readiness to honestly perform work and predict the likelihood of this employee or violate the law on trade secrets. Thus, the security department of the company, having collected metadata and analyzing them, is able to prevent the threat and get before the leak a certain probability of malicious intent for each employee, and this will increase the security of information.ru
dc.language.isoenru
dc.relation.ispartofseriesLecture Notes in Networks and Systems-
dc.subjectInformation securityru
dc.subjectProbability of malicious intentru
dc.subjectInternal violatorru
dc.subjectMetadata collectionru
dc.titleFactors of a Mathematical Model for Detection an Internal Attacker of the Companyru
dc.typeСтатьяru
vkr.instИнститут цифрового развитияru
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File SizeFormat 
scopusresults 2703 .pdf
  Restricted Access
132.14 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.