Page 6 - ISCI’2017
P. 6

and Integration Definition for Function Modeling (IDEF0) standards will be defined, basic principles,

            classification signs, and synthesis features will be founded. A classification of decision makers in
            accordance with international standards will be suggested.


            In more detail, the chapter’s structure is as follows. The chapter comprises four main parts, each of

            which confirms the relevance and necessity of the research aimed to increase the cyber-security. The
            already obtained results applicable to the CIN’s area are also demonstrated. The said parts form a

            solid foundation for further research along these directions.


            Part I shows the current state-of-the-arts in the area of CIN’s security throughout the globe, describes

            the research communities dealing with the  problems, and also presents the main results of time-
            frequency analysis of the set of basic (key) terms used in this area, which is provided by the authors’

            method (Kavun et al., 2012). The analysis in question was conducted for the time term 2000 to 2013.
            Therefore, the forecast trends can provide sufficient data and convince the research community in the

            exigency of the appropriate investigations in the area of CIN’s security.


            Part II presents certain results obtained by the co-authors in their previous research. In particular, one

            of the methods to detect (identify) insiders in the CINs (based on an example of the medical security

            in a hospital) is described. The importance of such a problem (detection of insiders) is confirmed by
            the amount of financial and medical data losses suffered by the CIEs owing to the insiders’ activities.

            It is worthwhile to underline that the existing methods and approaches to the solution of this problem
            operate mainly in the a posteriori manner, that is, after the negative influence has incurred damage.

            As a result, they imply only partial reimbursement of the damage, often far below the level of real
            losses. In contrast to that, the method proposed in the chapter allows one to prevent the expected

            losses incurred by the  insiders’ activities. In addition,  the authors provide an example visually

            demonstrating the method’s performance via the mapping analysis and the employees’ identification
            profiles.


            The multilateral research conducted by the co-authors in the above-described sphere of knowledge

            has permitted them to formulate aggregate classifiers of the appropriate conceptual gadgets and types
            of cyber-crimes. These topics are dealt with in Part III of the proposed chapter. Although the co-

            authors do not claim the proposed classifiers to be universal and over- comprehensive, yet they hope

            that these may happen to be useful to other researchers to help solve similar classification problems.




            6
   1   2   3   4   5   6   7   8   9   10   11