Tasks for information security risks management in making-decision process
Abstract
The author has submitted and tried to perform the number of tasks helping in modeling multi-factors information security risk management system. The author has prioritized financing different vulnerabilities by combining two approaches: processing approach in building events tree and mathematical formalizing the connections and affections levels of different events (vulnerabilities and threats) on information resource.
Problems in programming 2017; 4: 089-097
Keywords
Full Text:
PDF (Українська)References
International standard BS ISO/IEC 27005:2008, 2008-06-15.
Borovska, O., Sinitsyn, I., Svistunov, S., Rodin, Y. and Zagorodniy, A. (2014). Development of information resources security system in the national grid infrastructure of Ukraine. Kyiv: Stal, p.373. (In Ukrainian)
Rodin, Y. (2012). Processing approaches in the field of information security risk management modeling. Mathematical machines and systems, 4, P. 142-148. (In Ukrainian)
Borovska, O., Sinitsyn, I., and Rodin, Y. Comparing national and worldwide approaches in developing grid information security system. Programming Problems, 5, P. 99-109. (In Ukrainian)
Borovska, O., Sinitsyn, I., Svistunov, S., Rodin, Y. and Shilin, V. (2010). Approaches in developing information security system in the national grid infrastructure. Kyiv: Bogolyubov Institute for Theoretical Physics, p. 51. (In Ukrainian)
Zadeh, L. (1975). The concept of linguistic variable and its application to approximate reasoning. Information sciences, 8, pp. 199−249. https://doi.org/10.1016/0020-0255(75)90036-5
Bershtein, L., Bozhenyuk, A, Malyshev, L. (1991). Fuzzy modeling for experts systems in SAPR. Moscow: Energoatomizdat, p. 136. (In Russian)
Integrated Site Security for Grids. https://isseg-training.web.cern.ch/ISSeG-training/
DOI: https://doi.org/10.15407/pp2017.04.089
Refbacks
- There are currently no refbacks.