Doctrine
Reference:
Kulik A.V.
The terminology base of profiling: comparative analysis and unification
// Security Issues.
2024. № 3.
P. 1-13.
DOI: 10.25136/2409-7543.2024.3.71629 EDN: CNFIQC URL: https://en.nbpublish.com/library_read_article.php?id=71629
Abstract:
The article examines the evolution of profiling as a field of scientific knowledge and practical activity. The article analyzes the transformation of profiling from a highly specialized method in criminology to a comprehensive tool for analyzing behavior in the field of security and the need to revise and unify the terminology base of profiling. The integrated nature of profiling, its applied orientation and risk-oriented approach are investigated. An analysis of the contribution of key researchers to the development of the discipline is presented. The history of the development of the scientific and methodological base of profiling and scientific views characteristic of various periods of its development are considered. Various approaches to the definition of profiling in criminology, public safety, business and politics are considered. Separate methods used in various fields of profiling application and having a significant impact on its terminological content are considered. The methodology includes a historical analysis of the process of transformation of the discipline since its inception, the study of the contribution of key researchers, the study of various approaches to the definition of profiling in criminology, business and politics, a review of the most significant works on the topic of the article, as well as archival documents. The article examines in detail previously little-known works of foreign scientists, as well as archival documents. Based on a comprehensive comparative analysis, a new universal definition of profiling is proposed, reflecting its modern essence and the versatility of its application in the fields of criminology, public security, political psychology, intelligence and business. Each component of the proposed definition is justified, taking into account the scientific and methodological base of profiling and the established practice of its application. The gaps in the previously formulated definitions of profiling that do not correspond to the approaches available in foreign and domestic science are considered. In addition, the historical periods of profiling development with their characteristic approaches are highlighted. A number of terms are proposed and a conclusion is made about the need for further conceptualization of profiling as a complex discipline with a wide range of applications.
Keywords:
integrated method, psychobiographical reconstruction, evolution of profiling, business profiling, mass profiling, political profiling, behavioral analysis, defining profiling, profiling, risk-oriented approach
Technologies and methodology of security systems
Reference:
Nikitin P.V., Gorokhova R.I.
Analysis of modern intelligent methods for protecting critical information infrastructure
// Security Issues.
2024. № 3.
P. 14-38.
DOI: 10.25136/2409-7543.2024.3.69980 EDN: EXGKAV URL: https://en.nbpublish.com/library_read_article.php?id=69980
Abstract:
Critical information infrastructure (CII), including the financial sector, plays a key role in ensuring the sustainable functioning of economic systems and the financial stability of States. However, the growing digitalization of the financial industry and the introduction of innovative technologies are opening up new attack vectors for attackers. Modern cyber attacks are becoming more sophisticated, and traditional defenses are proving ineffective against new, previously unknown threats. There is an urgent need for more flexible and intelligent cybersecurity systems. Thus, the subject of the study is modern intelligent methods and technologies for protecting critical information infrastructure (CII) from cyber attacks. The object of the research is methods and means of ensuring the protection of critical information infrastructure using artificial intelligence and machine learning technologies. The methodological basis of this study is a comprehensive analysis of the scientific literature on the use of intelligent methods and technologies to protect critical information infrastructure. During the review and critical analysis of relevant scientific publications, key problems and unresolved tasks requiring further scientific research and practical developments in this subject area were identified. This methodological approach allowed us to form a holistic view of the current state and prospects for the development of intelligent cybersecurity tools for critical financial systems, as well as to identify priority areas for further research. The main directions of scientific novelty of this research are: 1. A detailed review of promising approaches based on artificial intelligence and machine learning technologies to ensure effective protection of CII organizations from modern complex cyber attacks. 2. Identification and analysis of a number of key scientific and technical problems that need to be solved to increase reliability, interpretability and trust in intelligent cybersecurity systems, including issues of robustness to attacks, active online learning, federated and differential private data processing. 3. Identification of promising areas for further research and development in the field of application of specialized methods of secure and trusted AI to protect critical financial infrastructure. Thus, this research makes a significant contribution to the development of scientific and methodological apparatus and practical solutions for the use of intelligent methods to ensure cybersecurity.
Keywords:
DDoS attacks, intelligent methods, neural networks, cyber attacks, cybersecurity, deep learning, machine learning, information security, artificial intelligence, Critical information infrastructure