Abstract

+ Linear and dynamic models of the system of information security in social networks, taking into consideration the relationships between users, were studied and the resistance of the security system was analyzed. There is a practical interest in studying dependence of the behavior of the system of social network security on the parameters of users’ interaction. Dynamic systems of information security in social networks in the mathematical sense of this term were considered. A dynamic system refers to any object or process, for which the concept of state as a totality of certain magnitudes at a given time is unambiguously defined and the law that describes a change (evolution) of the initial state over time was assigned. The network of social interactions consists of a totality of social users and a totality of the relations between them. Individuals, social groups, organizations, cities, countries can act as users. Relations imply not only communication interactions between users but also relations of the exchange of various resources and activities, including conflict relations. As a result of research, it was found that the security systems of a social network are nonlinear. Theoretical study of the dynamic behavior of an actual object requires the creation of its mathematical model. The procedure for developing a model is to compile mathematical equations based on physical laws. These laws are stated in the language of differential equations. Phase portraits of the data security system in the MATLAB/Multisim program, which indicate the stability of a security system in the working range of parameters even at the maximum value of the impacts, were determined. Thus, the influence of users’ interaction parameters on the parameters of the system of social network security was explored. Such study is useful and important in terms of information security in the network, since the parameters of users’ interaction significantly affect, up to 100 %, the security indicator.

Highlights

  • In the modern world, information needs reliable protection: from unauthorized access and distribution, accidental deletion, or change

  • This is due to the fact that informatization and digitization of information have become widespread in all spheres of human activity, including the storage of personal and working data

  • Some researchers have moved to studying the impact of specific social network parameters directly on information security parameters where it is proved that the protection system is nonlinear [28]

Read more

Summary

Introduction

Information needs reliable protection: from unauthorized access and distribution, accidental deletion, or change. Some researchers have moved to studying the impact of specific social network parameters directly on information security parameters where it is proved that the protection system is nonlinear [28] They studied the dependence of non­linear parameters of the security system against specific parameters of social networks, including trust between users [29]. Information security in social networks uses traditional methods of protection (identification, authentication [30–32], firewalls, security subnets, etc.) They do not take into consideration the impact of specific parameters of the network itself, including users’ interaction parameters, which is of practical importance, because the impact of these para­ meters on security is significant. That is why the studies devoted to the development of a procedure for taking into consideration the influence of specific parameters on information security in social networks, including users’ interaction, are relevant

Literature review and problem statement
The aim and objectives of the study
The study materials and methods
Findings
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.