Title | Analytical Model of Actions of the Information Security Violator on Covert Extraction of Confidential Information Processed on the Protected Object |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Ilina, D. V., Eryshov, V. G. |
Conference Name | 2021 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF) |
Keywords | Analytical models, Collaboration, composability, compositionality, confidential information, Data models, Human Behavior, human factors, Information security, information theoretic security, Markov random process, Materials reliability, Model, policy-based governance, Probabilistic logic, pubcrawl, random processes, resilience, Resiliency, Scalability, special technical means, Telecommunications |
Abstract | The article describes an analytical model of the actions of an information security violator for the secret extraction of confidential information processed on the protected object in terms of the theory of Markov random processes. The characteristics of the existing models are given, as well as the requirements that are imposed on the model for simulating the process. All model states are described in detail, as well as the data flow that is used in the process simulation. The model is represented as a directed state graph. It also describes the option for evaluating the data obtained during modeling. In the modern world, with the developing methods and means of covert extraction of information, the problem of assessing the damage that can be caused by the theft of the organization's data is acute. This model can be used to build a model of information security threats. |
DOI | 10.1109/WECONF51603.2021.9470745 |
Citation Key | ilina_analytical_2021 |