Visible to the public Analytical Model of Actions of the Information Security Violator on Covert Extraction of Confidential Information Processed on the Protected Object

TitleAnalytical Model of Actions of the Information Security Violator on Covert Extraction of Confidential Information Processed on the Protected Object
Publication TypeConference Paper
Year of Publication2021
AuthorsIlina, D. V., Eryshov, V. G.
Conference Name2021 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF)
KeywordsAnalytical models, Collaboration, composability, compositionality, confidential information, Data models, Human Behavior, human factors, Information security, information theoretic security, Markov random process, Materials reliability, Model, policy-based governance, Probabilistic logic, pubcrawl, random processes, resilience, Resiliency, Scalability, special technical means, Telecommunications
AbstractThe article describes an analytical model of the actions of an information security violator for the secret extraction of confidential information processed on the protected object in terms of the theory of Markov random processes. The characteristics of the existing models are given, as well as the requirements that are imposed on the model for simulating the process. All model states are described in detail, as well as the data flow that is used in the process simulation. The model is represented as a directed state graph. It also describes the option for evaluating the data obtained during modeling. In the modern world, with the developing methods and means of covert extraction of information, the problem of assessing the damage that can be caused by the theft of the organization's data is acute. This model can be used to build a model of information security threats.
DOI10.1109/WECONF51603.2021.9470745
Citation Keyilina_analytical_2021