Page 6 - ISCI’2017
P. 6
and Integration Definition for Function Modeling (IDEF0) standards will be defined, basic principles,
classification signs, and synthesis features will be founded. A classification of decision makers in
accordance with international standards will be suggested.
In more detail, the chapter’s structure is as follows. The chapter comprises four main parts, each of
which confirms the relevance and necessity of the research aimed to increase the cyber-security. The
already obtained results applicable to the CIN’s area are also demonstrated. The said parts form a
solid foundation for further research along these directions.
Part I shows the current state-of-the-arts in the area of CIN’s security throughout the globe, describes
the research communities dealing with the problems, and also presents the main results of time-
frequency analysis of the set of basic (key) terms used in this area, which is provided by the authors’
method (Kavun et al., 2012). The analysis in question was conducted for the time term 2000 to 2013.
Therefore, the forecast trends can provide sufficient data and convince the research community in the
exigency of the appropriate investigations in the area of CIN’s security.
Part II presents certain results obtained by the co-authors in their previous research. In particular, one
of the methods to detect (identify) insiders in the CINs (based on an example of the medical security
in a hospital) is described. The importance of such a problem (detection of insiders) is confirmed by
the amount of financial and medical data losses suffered by the CIEs owing to the insiders’ activities.
It is worthwhile to underline that the existing methods and approaches to the solution of this problem
operate mainly in the a posteriori manner, that is, after the negative influence has incurred damage.
As a result, they imply only partial reimbursement of the damage, often far below the level of real
losses. In contrast to that, the method proposed in the chapter allows one to prevent the expected
losses incurred by the insiders’ activities. In addition, the authors provide an example visually
demonstrating the method’s performance via the mapping analysis and the employees’ identification
profiles.
The multilateral research conducted by the co-authors in the above-described sphere of knowledge
has permitted them to formulate aggregate classifiers of the appropriate conceptual gadgets and types
of cyber-crimes. These topics are dealt with in Part III of the proposed chapter. Although the co-
authors do not claim the proposed classifiers to be universal and over- comprehensive, yet they hope
that these may happen to be useful to other researchers to help solve similar classification problems.
6