Page 11 - ISCI’2017
P. 11
2 Time-Frequency Analysis for Some Definitions of the Critical Infrastructure Protection
It should been mentioned that nowadays, we can see a strong popularization of some definitions or
key aspects in the area of information security (Kavun, 2009). For example, it concerns the following
definitions: Cybercrimes, Computer Crimes, Internet-crimes, Cyber-criminals, Cyber Security, etc.
First, we will recall some definitions.
Definition 1: An insider is a person whose work varies in time under the influence of external,
internal, and individual causes (Kavun et al., 2012). This work reflects a readiness of this person for
actions. In addition, the socio-cultural environment of this person can be regarded as a violation of
existing standards (disclosure of information with restricted access) and traditions (not doing the job,
it is the second feature).
Definition 2: Insider’s information is substantial undisclosed Public Service Information
(PSI) important for an organization (Kavun and Sorbat, 2012). This information disclosed could lead
to the loss of competitiveness of the organization or even to its collapse (it’s the first distinction from
other definitions). Organization’s employees who have this information are typically the system
administrators or the owners. Organization’s employees who had received this information can be
called insiders. All these processes refer to the sphere of economic and information security (Kavun
and Brumnik, 2013).
For those and some other similar definitions, the authors have carried out a research about
their distribution over the time-line 2000 – 2013. This research is based on the method of Internet-
analysis (Kavun et al., 2012). At the same time, this distribution was based on their popularization or
demand; also, it can be called as the time-frequency analysis. Some results with their normalizing of
this research (for better presentation) are shown in Table 1. All the submitted data have been
normalized for a better visualization, and to receive a possibility of comparing those results.
The results can be seen in Fig. 1, which is showing them very clearly in a graphic mode. The
most popular of these definitions have been used since 2006. In addition, only for the definition “Cyber-
crime detection (CCD)”, we can see a big growth since 2000 over 2004. For remaining definitions, we
can see some increase in their use since 2006. Especially it concerns the following definitions: “cyber
analysis” in 2008 received a big growth, but after two years, this area became uninteresting for the
specialists. “Computer crime” is an area, which had a variable success in 2006 and 2010. In addition,
the definition “Internet crime” had a variable success only in 2009 and 2012. For other definitions,
which were studied in the authors’ research, we can see a quite variable interest (ES INFECO, 2012-
2013). At the same time, this interest is confirming a fact that notwithstanding that, the situation in these
areas (based on similar definitions) still retains the interest on part of specialists and professionals.
11