Персона: Леонов, Павел Юрьевич
Загружается...
Email Address
Birth Date
Научные группы
Организационные подразделения
Организационная единица
Институт финансовых технологий и экономической безопасности
Институт финансовых технологий и экономической безопасности (ИФТЭБ) Национального исследовательского ядерного университета "МИФИ" готовит кадры в интересах национальной системы по противодействию легализации (отмыванию) доходов, полученных преступным путем, и финансированию терроризма (ПОД/ФТ).
Междисциплинарность образования позволит выпускникам ИФТЭБ НИЯУ МИФИ легко адаптироваться на современном рынке труда и в бизнес-среде.
Статус
Фамилия
Леонов
Имя
Павел Юрьевич
Имя
13 results
Результаты поиска
Теперь показываю 1 - 10 из 13
- ПубликацияТолько метаданныеA Bayesian Network-Based Model for Fraud Risk Assessment(2024) Leonov, P. Y.; Sushkov, V. M.; Stanislav V. Vishnevsky.; Romanovsky, V. A.; Леонов, Павел Юрьевич; Сушков, Виктор Михайлович; Романовский, Валентин Андреевич
- ПубликацияТолько метаданныеTesting for Benford’s Law as a Response to the Risks of Material Misstatement Due to Fraud(2024) Sushkov, V. M.; Leonov, P. Y.; Сушков, Виктор Михайлович; Леонов, Павел Юрьевич
- ПубликацияТолько метаданныеK-Means Method as a Tool of Big Data Analysis in Risk-Oriented Audit(2019) Suyts, V. P.; Leonov, P. Y.; Kotelyanets, O. S.; Ivanov, N. V.; Леонов, Павел Юрьевич© 2019, Springer Nature Switzerland AG.Considering the modern risk-oriented approach to auditing, environmental instability, as well as the lack of clear recommendations for conducting selective surveys, improving sampling methods is relevant, updating and new development of methodological tools for conducting selective audits are required; the article substantiates the use of the K-means method as a selective method for constructing an audit sample, special attention was paid to the professional judgment of the auditor and his need to apply K-means clustering.
- ПубликацияТолько метаданныеDevelopment of a Model for Identifying High-Risk Operations for AML/CFT Purposes(2019) Suyts, V. P.; Leonov, P. Y.; Kotelyanets, O. S.; Ivanov, N. V.; Леонов, Павел Юрьевич© 2019, Springer Nature Switzerland AG.The article has a high practical significance, which is that the described model of processing and clustering data on banking operations has significantly accelerated the process of identifying suspicious (high risk) among them and creating a portrait of a client of a credit institution based on its cashless payments (including his counterparties).
- ПубликацияТолько метаданныеThe main social engineering techniques aimed at hacking information systems(2021) Leonov, P. Y.; Vorobyev, A. V.; Ezhova, A. A.; Kotelyanets, O. S.; Zavalishina, A. K.; Morozov, N. V.; Леонов, Павел Юрьевич; Завалишина, Александра Константиновна; Морозов, Николай Владимирович© 2021 IEEE.This article examines the main methods of phishing (a type of online fraud in which an attacker wants to obtain authentication data from a victim) as a social engineering tool. Social engineering attack is the most common attack method used by attackers. Methods of social engineering aimed at hacking information systems are described in the article. Such phishing attacks as vishing (phishing with the implementation of a telephone conversation), smishing (carried out by scammers by sending SMS messages), spear phishing (aimed at a specific person or group of persons), whaling (aimed at the management of organizations), clone phishing (can be aimed at a large audience). These attacks expose confidential information and spread malicious software to victims' personal devices. The user (person) himself was identified as the most vulnerable element of the information security system, and social engineers are aimed at their rash actions. The phishing technique is the most widespread in the world practice for stealing the login-password combination; for its varieties, the basic schemes of interaction between the user and the attacker are described.
- ПубликацияТолько метаданныеDeveloping a Tool to Analyze the Use of Social Media to Identify New Types of Digital Financial Assets(2022) Leonov, P. Y.; Mikheeva, A. V.; Elkina, D. Y.; Musin, N. M.; Norkina, A. N.; Леонов, Павел Юрьевич; Елкина, Дарья Юрьевна; Норкина, Анна НиколаевнаThis article examines the created method of identifying new digital financial assets in the Telegram social network. The importance and relevance of this topic is due to both a noticeable increase in the number of users of social networks and an increase in public interest in digital financial assets and digital currencies, especially cryptocurrencies. The object of the study is the popular Telegram messenger's channels about the cryptocurrency. The main part of the article describes the developed algorithm consisting of four main steps, such as Data Collection, Pre-processing the received data, Analyzing the data obtained, Results interpretation. Python is chosen as the software for the implementation of the algorithm. In addition, the authors demonstrate the carrying out of the created algorithm in practice using the example Bitcoin and Ethereum. In the result, the developed tools allow an analyst to pay attention to a specific cryptocurrency in time, which is often mentioned in the Telegram messenger in order to prevent possible operations of money laundering and terrorist financing. © 2022 IEEE.
- ПубликацияТолько метаданныеInformation Security in Digital Economy(2022) Galoyan, N. A.; Kazakova, E. G.; Leonov, P. Y.; Norkina, A. N.; Morozov, N. V.; Myseva, E. R.; Галоян, Натали Альбертовна; Казакова, Елизавета Геннадьевна; Леонов, Павел Юрьевич; Норкина, Анна Николаевна; Морозов, Николай Владимирович; Мысева, Екатерина РомановнаIn the modern high-tech era, the world economy has found itself in the process of a global transformation. A couple of years ago the Internet was a sort of addition to offline business. The events of recent years, such as the pandemic and the introduction of remote technologies for work and study, forced humanity to plunge into virtual reality like never before, which became the reason for the formation of digitalisation. Despite the fact that the "Digital Economy"has become widespread among advanced countries, and blockchain technology, smart contracts are becoming increasingly popular in the world, in this area there are still a number of problems that need to be solved for the safe use of technology. It should be taken into account that despite the rapid development of digital technology in the world, along with it the probability of new unexplored risks increases. It is also necessary to consider the issue of national security of the country during the development and implementation of information technology, especially in government agencies. It is necessary to take into account that there is a huge work to be done in terms of development of normative-legal regulation of these issues and improvement of legislation in the field of information technology and information security. © 2022 IEEE.
- ПубликацияТолько метаданныеImproving the Methodology for Integrated Testing of Journal Entries by Benford’s Law(2024) Leonov, P. Y.; Sushkov, V. M.; Boiko, S. A.; Stepanenkova, M. A.; Леонов, Павел Юрьевич; Сушков, Виктор Михайлович
- ПубликацияТолько метаданныеIntegrated application of Benford's Law tests to detect corporate fraud(2022) Leonov, P. Y.; Suyts, V. P.; Norkina, A. N.; Sushkov, V. M.; Леонов, Павел Юрьевич; Норкина, Анна Николаевна; Сушков, Виктор Михайлович
- ПубликацияТолько метаданныеPossibility of Benford’s Law Application for Diagnosing Inaccuracy of Financial Statements(2022) Suyts, V. P.; Leonov, P. Y.; Rychkov, V. A.; Ezhova, A. A.; Sushkov, V. M.; Kuznetsova, N. V.; Леонов, Павел Юрьевич; Рычков, Вадим Александрович; Сушков, Виктор Михайлович; Кузнецова, Надежда Владимировна© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.The paper describes a technique for diagnosing data inaccuracy using Benford’s law. The Benford distribution for the first significant digit of a random decimal number is presented graphically and mathematically. The main requirements for data are listed, which are consistent with Benford’s law: the data must refer to one process, there must be no maximum and minimum restrictions in the studied population, artificial introduction of the numbering system is not allowed, and there must be no obvious linking patterns between numbers. When examining the possibility of applying Benford’s law to diagnose inaccuracies in the financial statements of an organization, the costs of two companies for payment of services to suppliers were analyzed. It was found that in the absence of attempts to manipulate reporting, performance indicators are close to theoretically predicted based on Benford’s law. Attempts to manipulate reporting are reflected in corresponding deviations from Benford’s law. The possibility of applying Benford’s law to diagnose unreliability of an organization’s financial statements has been proved.