|
Program Systems: Theory and Applications, 2015, Volume 6, Issue 2, Pages 63–83
(Mi ps169)
|
|
|
|
Hardware, software and distributed supercomputer systems
Computer systems security threats: classification, sources of origin and counteraction methods
N. S. Abramov, V. P. Fralenko Ailamazyan Program System Institute of RAS
Abstract:
The paper discusses the computer systems security threats sources. Proposed scientific response for emerging threats and implemented their classification. Particular attention is given to promising protection methods. Proposed model of information security management system. (In Russian).
Key words and phrases:
information security, threat, protection, model.
Received: 07.05.2015 Accepted: 25.05.2015
Citation:
N. S. Abramov, V. P. Fralenko, “Computer systems security threats: classification, sources of origin and counteraction methods”, Program Systems: Theory and Applications, 6:2 (2015), 63–83
Linking options:
https://www.mathnet.ru/eng/ps169 https://www.mathnet.ru/eng/ps/v6/i2/p63
|
Statistics & downloads: |
Abstract page: | 218 | Full-text PDF : | 89 | References: | 30 |
|