Tasks for information security risks management in making-decision process

Y.S. Rodin

Abstract


The author has submitted and tried to perform the number of tasks helping in modeling multi-factors information security risk management system. The author has prioritized financing different vulnerabilities by combining two approaches: processing approach in building events tree and mathematical formalizing the connections and affections levels of different events (vulnerabilities and threats) on information resource.

Problems in programming 2017; 4: 089-097


Keywords


risk; information; security; threats; vulnerability; fuzzy; logic; model

References


International standard BS ISO/IEC 27005:2008, 2008-06-15.

Borovska, O., Sinitsyn, I., Svistunov, S., Rodin, Y. and Zagorodniy, A. (2014). Development of information resources security system in the national grid infrastructure of Ukraine. Kyiv: Stal, p.373. (In Ukrainian)

Rodin, Y. (2012). Processing approaches in the field of information security risk management modeling. Mathematical machines and systems, 4, P. 142-148. (In Ukrainian)

Borovska, O., Sinitsyn, I., and Rodin, Y. Comparing national and worldwide approaches in developing grid information security system. Programming Problems, 5, P. 99-109. (In Ukrainian)

Borovska, O., Sinitsyn, I., Svistunov, S., Rodin, Y. and Shilin, V. (2010). Approaches in developing information security system in the national grid infrastructure. Kyiv: Bogolyubov Institute for Theoretical Physics, p. 51. (In Ukrainian)

Zadeh, L. (1975). The concept of linguistic variable and its application to approximate reasoning. Information sciences, 8, pp. 199−249. https://doi.org/10.1016/0020-0255(75)90036-5

Bershtein, L., Bozhenyuk, A, Malyshev, L. (1991). Fuzzy modeling for experts systems in SAPR. Moscow: Energoatomizdat, p. 136. (In Russian)

Integrated Site Security for Grids. https://isseg-training.web.cern.ch/ISSeG-training/




DOI: https://doi.org/10.15407/pp2017.04.089

Refbacks

  • There are currently no refbacks.