Page 11 - ISCI’2017
P. 11

2 Time-Frequency Analysis for Some Definitions of the Critical Infrastructure Protection


            It should been mentioned that nowadays, we can see a strong popularization of some definitions or

            key aspects in the area of information security (Kavun, 2009). For example, it concerns the following
            definitions: Cybercrimes, Computer Crimes, Internet-crimes, Cyber-criminals, Cyber Security, etc.

            First, we will recall some definitions.
                   Definition 1: An insider is a person whose work varies in time under the influence of external,

            internal, and individual causes (Kavun et al., 2012). This work reflects a readiness of this person for

            actions. In addition, the socio-cultural environment of this person can be regarded as a violation of
            existing standards (disclosure of information with restricted access) and traditions (not doing the job,

            it is the second feature).
                   Definition 2:  Insider’s  information  is substantial undisclosed Public Service Information

            (PSI) important for an organization (Kavun and Sorbat, 2012). This information disclosed could lead
            to the loss of competitiveness of the organization or even to its collapse (it’s the first distinction from

            other definitions).  Organization’s  employees who have  this  information are typically the system

            administrators or the owners. Organization’s employees who had received this information can be
            called insiders. All these processes refer to the sphere of economic and information security (Kavun

            and Brumnik, 2013).

                   For those and some other similar definitions, the authors have carried out a research about
            their distribution over the time-line 2000 – 2013. This research is based on the method of Internet-

            analysis (Kavun et al., 2012). At the same time, this distribution was based on their popularization or
            demand; also, it can be called as the time-frequency analysis. Some results with their normalizing of

            this research (for better presentation)  are shown  in Table 1.  All  the submitted data have  been
            normalized for a better visualization, and to receive a possibility of comparing those results.

                   The results can be seen in Fig. 1, which is showing them very clearly in a graphic mode. The

            most popular of these definitions have been used since 2006. In addition, only for the definition “Cyber-
            crime detection (CCD)”, we can see a big growth since 2000 over 2004. For remaining definitions, we

            can see some increase in their use since 2006. Especially it concerns the following definitions: “cyber
            analysis” in 2008 received a big growth, but after two years, this area became uninteresting for the

            specialists. “Computer crime” is an area, which had a variable success in 2006 and 2010. In addition,
            the definition “Internet crime” had a variable success only in 2009 and 2012. For other definitions,

            which were studied in the authors’ research, we can see a quite variable interest (ES INFECO, 2012-

            2013). At the same time, this interest is confirming a fact that notwithstanding that, the situation in these
            areas (based on similar definitions) still retains the interest on part of specialists and professionals.



                                                                                                          11
   6   7   8   9   10   11   12   13   14   15   16