IDEAS home Printed from https://ideas.repec.org/a/ssi/jouesi/v11y2024i3p387-407.html
   My bibliography  Save this article

Reduction of cybersecurity risk via evaluating users' behaviour

Author

Listed:
  • Antonín Korauš

    (Academy of the Police Force in Bratislava, Slovakia)

  • Vladimír Špitalský

    (Beset, spol. s r. o., Slovakia)

  • Ľubomír Török

    (Beset, spol. s r. o., Slovakia)

  • Jozef Balga

    (Academy of the Police Force in Bratislava, Slovakia)

  • Ľudmila Lipková

    (Alexander Dubček University of Trenčín, Slovakia)

Abstract

Since the 1990s, process analysis has attained a fundamental position among business management approaches. With the gradual development and expansion of digitalization in businesses that have begun to use advanced information systems, a demand also arose to survey the processes within companies, including retrospectively from the digital records of information systems. This requirement laid the foundation for the emergence of the scientific discipline known today as Process Mining. In the presented article, we introduce its basic concepts and point out the possibility of using them in the field of security analysis of the log of a general system, which creates digital records of its operation (a so-called journal or log). The result of using Process Mining methods is identifying unrecorded processes running in a system and various deviations from the expected system operation, which may signal security threats to the system itself or its operator. In the battle against hybrid threats, many resources are explicitly devoted to protecting cyberspace. The approach proposed in this article allows a system to be analysed as a whole, identifying patterns of behaviour that would not otherwise arouse suspicion in individual steps but, as a sequence of separate steps (processes), do not fall into the expected pattern of system behaviour. This can be used as a long-term sustainable concept in the fight against hybrid threats. An analysis of a system’s behavior can be built on continuous “learning” by labelling newly discovered processes as safe or unsafe, ensuring the long-term sustainability of this approach. The main advantage of the proposed analyses is that they run as an oversight of the system itself, analysing it only based on records from its event log. Therefore, no interventions are needed in the architecture and source code of the analysed system, and the analyses do not affect its operation or data.

Suggested Citation

  • Antonín Korauš & Vladimír Špitalský & Ľubomír Török & Jozef Balga & Ľudmila Lipková, 2024. "Reduction of cybersecurity risk via evaluating users' behaviour," Entrepreneurship and Sustainability Issues, VsI Entrepreneurship and Sustainability Center, vol. 11(3), pages 387-407, March.
  • Handle: RePEc:ssi:jouesi:v:11:y:2024:i:3:p:387-407
    DOI: 10.9770/jesi.2024.11.3(27)
    as

    Download full text from publisher

    File URL: https://jssidoi.org/jesi/uploads/articles/43/Koraus_Reduction_of_cybersecurity_risk_via_evaluating_users_behaviour.pdf
    Download Restriction: no

    File URL: https://jssidoi.org/jesi/article/1185
    Download Restriction: no

    File URL: https://libkey.io/10.9770/jesi.2024.11.3(27)?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Keywords

    hybrid threats; process analysis; process mining; security; cyberspace; information systems; system behavior; cybersecurity; management;
    All these keywords.

    JEL classification:

    • E27 - Macroeconomics and Monetary Economics - - Consumption, Saving, Production, Employment, and Investment - - - Forecasting and Simulation: Models and Applications
    • F50 - International Economics - - International Relations, National Security, and International Political Economy - - - General
    • G32 - Financial Economics - - Corporate Finance and Governance - - - Financing Policy; Financial Risk and Risk Management; Capital and Ownership Structure; Value of Firms; Goodwill

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ssi:jouesi:v:11:y:2024:i:3:p:387-407. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Manuela Tvaronaviciene (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.