Method for assessing the risk of user compromise based on individual security profile

Main Article Content

DOI

Svitlana Lehominova

s.legominova@duikt.edu.ua

https://orcid.org/0000-0002-4433-5123
Mykhailo Zaporozhchenko

m.zaporozhchenko@duikt.edu.ua

https://orcid.org/0000-0003-0182-9497
Tetiana Kapeliushna

t.kapeliushna@duikt.edu.ua

https://orcid.org/0000-0001-7490-6751
Yuriy Shchavinsky

y.shchavinskyi@duikt.edu.ua

https://orcid.org/0000-0002-2319-8983
Tetiana Muzhanova

t.muzhanova@duikt.edu.ua

https://orcid.org/0000-0002-7435-0287

Abstract

This article presents a method for assessing the risk of user compromise in corporate information systems caused by social engineering cyberattacks. The approach integrates an evaluation of the individual security profile of each user – based on psychological, organizational, technical, and information influence factors – with graph-based modelling of internal interactions within the organization. Unlike most existing methods that focus solely on isolated user characteristics or assume a single-stage (direct) cyberattack scenario, the proposed method accounts for the propagation of cyberattacks through multi-stage trajectories in communication networks. A formalized four-phase model of social engineering cyberattack implementation is developed, with each phase described as a function of interacting factors. Conditional probabilities are estimated using dynamic coefficients that reflect both the base value and the contextual impact of modifying factors. A graph-based procedure is introduced to calculate the probability of multi-stage compromise based on the structure and intensity of user interactions (e.g., project participation, communication frequency, hierarchical relationships, and shared access to information assets). The proposed method was validated through individual user security profiling, followed by scenario-based modeling of multi-stage social engineering attack propagation on a representative subset. Results show that users with strong individual protection can remain vulnerable due to their position in critical communication chains. The visualization of trajectories exceeding a defined probability threshold supports the identification of high-risk paths and intermediary nodes that require prioritized protection measures. The main scientific contribution lies in combining individualized risk assessment with system-level propagation modelling using interpretable and adaptable mathematical constructs. The method does not require large volumes of empirical data, which ensures its practical applicability even in conditions of limited access to internal information. Future research will focus on automating data collection for factor assessment, adapting the model for real-time operation, and extending it through advanced modelling of behavioral attack scenarios.

Keywords:

information and cybersecurity, social engineering, cyberattack, risk management, user vulnerability, threat modeling

References

Article Details

Lehominova, S., Zaporozhchenko, M., Kapeliushna, T., Shchavinsky, Y., & Muzhanova, T. (2026). Method for assessing the risk of user compromise based on individual security profile. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 16(1), 130–137. https://doi.org/10.35784/iapgos.7754