|
Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics, 2011, Number 2, Pages 74–79
(Mi vagtu127)
|
|
|
|
This article is cited in 1 scientific paper (total in 1 paper)
COMPUTER SOFTWARE AND COMPUTING EQUIPMENT
Technique of threats set formation for an information object
S. V. Belov Astrakhan State Technical University
Abstract:
The problem of formation of actual threats list for an information object is considered in the paper. Quantitative estimations of threats of information security (probability of accomplishment; losses connected with threat accomplishment and time) and factors influencing their estimation are considered. The generalized structure scheme of threats model formation, consisting of three basic stages is shown: formation of a general database of threats; design of initial set of threats on the basis of knowledge of the information object; formation of the list of actual threats on the basis of expert methods. Criteria of experts selection are generated for an expert group, and estimations are resulted for the level of experts’ competence.
Keywords:
information security, risks, system analysis, classification, analysis technique.
Received: 20.06.2011
Citation:
S. V. Belov, “Technique of threats set formation for an information object”, Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2011, no. 2, 74–79
Linking options:
https://www.mathnet.ru/eng/vagtu127 https://www.mathnet.ru/eng/vagtu/y2011/i2/p74
|
Statistics & downloads: |
Abstract page: | 125 | Full-text PDF : | 72 | References: | 38 | First page: | 1 |
|