Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics, 2011, Number 2, Pages 74–79 (Mi vagtu127)  

This article is cited in 1 scientific paper (total in 1 paper)

COMPUTER SOFTWARE AND COMPUTING EQUIPMENT

Technique of threats set formation for an information object

S. V. Belov

Astrakhan State Technical University
Full-text PDF (195 kB) Citations (1)
References:
Abstract: The problem of formation of actual threats list for an information object is considered in the paper. Quantitative estimations of threats of information security (probability of accomplishment; losses connected with threat accomplishment and time) and factors influencing their estimation are considered. The generalized structure scheme of threats model formation, consisting of three basic stages is shown: formation of a general database of threats; design of initial set of threats on the basis of knowledge of the information object; formation of the list of actual threats on the basis of expert methods. Criteria of experts selection are generated for an expert group, and estimations are resulted for the level of experts’ competence.
Keywords: information security, risks, system analysis, classification, analysis technique.
Received: 20.06.2011
Document Type: Article
UDC: [002.52:004.056.5]:34.03
Language: Russian
Citation: S. V. Belov, “Technique of threats set formation for an information object”, Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2011, no. 2, 74–79
Citation in format AMSBIB
\Bibitem{Bel11}
\by S.~V.~Belov
\paper Technique of threats set formation for an information object
\jour Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics
\yr 2011
\issue 2
\pages 74--79
\mathnet{http://mi.mathnet.ru/vagtu127}
Linking options:
  • https://www.mathnet.ru/eng/vagtu127
  • https://www.mathnet.ru/eng/vagtu/y2011/i2/p74
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Вестник Астраханского государственного технического университета. Серия: Управление, вычислительная техника и информатика
    Statistics & downloads:
    Abstract page:125
    Full-text PDF :72
    References:38
    First page:1
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024