Methods on determination of the output data for assessing residual risks with ensuring the confidentiality of information objects
An application of quantitative characteristics in the form of values of residual risk or probabilities of overcoming by the violator of protection facilities of different security properties is offered for the analysis of information security of the automated systems. To assess the protection of con...
Saved in:
| Date: | 2017 |
|---|---|
| Main Authors: | Vasilenko, V. S., Matov, O. Ya. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2017
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/142921 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Methods on determination of the output data for assessing residual risks with ensuring the confidentiality of information objects
by: V. S. Vasylenko, et al.
Published: (2017)
by: V. S. Vasylenko, et al.
Published: (2017)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Increasing the channel capacity of a part of telecommunivation network at the expense of space-energy multiplexing
by: Anakhov, P. V.
Published: (2017)
by: Anakhov, P. V.
Published: (2017)
Privacy, confidentiality and security of personal data
by: V. M. Bryzhko, et al.
Published: (2020)
by: V. M. Bryzhko, et al.
Published: (2020)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Synthesis of information and telecommunication networks of automatized environmental security systems with the purpose of gaining maximum noise resistance with a given efficiency
by: Dovgiy, Stanislav O., et al.
Published: (2021)
by: Dovgiy, Stanislav O., et al.
Published: (2021)
Persons bound with obligation to keep health data confidential
by: O. A. Chaban
Published: (2017)
by: O. A. Chaban
Published: (2017)
Technology for ensuring the survivability of territorially distributed information computer systems in a unified information space
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Problems of ensuring the integrity and confidentiality of automated library information system databases
by: I. Chaban
Published: (2016)
by: I. Chaban
Published: (2016)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
ANALYSIS OF THE STATE OF THE EXTERNAL LIGHTNING PROTECTION SYSTEM FOR OPERATING ENERGY OBJECTS
by: Koliushko, D. G., et al.
Published: (2020)
by: Koliushko, D. G., et al.
Published: (2020)
Abidance confidentiality of mediation by the advocate-mediator in Ukraine
by: A. V. Bitsai
Published: (2015)
by: A. V. Bitsai
Published: (2015)
PROBLEMS IN TESTING DIGITAL PROTECTIVE RELAY FOR IMMUNITY TO INTENTIONAL DESTRUCTIVE ELECTROMAGNETIC IMPACTS. CONTINUATION OF THE THEME
by: Gurevich, Vladimir I.
Published: (2015)
by: Gurevich, Vladimir I.
Published: (2015)
Methodological Problems of Collection and Analysis of Confidential Information Leakage
by: O. Y. Zhabynets
Published: (2014)
by: O. Y. Zhabynets
Published: (2014)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Neural and Bayesian networks in the problem of credit risk analysis
by: Kuznietsova, N. V., et al.
Published: (2015)
by: Kuznietsova, N. V., et al.
Published: (2015)
Usage of intellectual analysis of ecological-economic data in the pension insurance system and for forecasting expenditures on social protection and social security
by: Zarudnii, Oleksii B.
Published: (2024)
by: Zarudnii, Oleksii B.
Published: (2024)
Threat assessment mathematical model for potentially dangerous objects of critical infrastructure in the combat zone
by: Murasov, R.K., et al.
Published: (2023)
by: Murasov, R.K., et al.
Published: (2023)
Тechnology of security confidential information from inside threats
by: Antoniuk, A.A., et al.
Published: (2025)
by: Antoniuk, A.A., et al.
Published: (2025)
ANALYSIS OF HETEROGENEITY OF ELECTRICAL NETWORKS WITH RENEWABLE SOURCES OF ELECTRICAL ENERGY
by: Kyryk , V.
Published: (2025)
by: Kyryk , V.
Published: (2025)
Analytical models of multi-priority cloud data-centers with a mixed discipline of providing services taking into account the features of functioning and possible failures.
by: Matov, A. Ya.
Published: (2019)
by: Matov, A. Ya.
Published: (2019)
Satellite data in the substantiation and creation of objects of the Nature Reserve Fund and monitoring of their ecological condition
by: Lischenko, Lyidmila, et al.
Published: (2025)
by: Lischenko, Lyidmila, et al.
Published: (2025)
Information technology to ensure the survivability of sensor networks
by: Petrivskyi, V.Y., et al.
Published: (2022)
by: Petrivskyi, V.Y., et al.
Published: (2022)
GEOSITES AS OBJECTS OF NATURAL RESERVE FUND (PROBLEMATIC ISSUES)
by: Samoilenko, L. V.
Published: (2020)
by: Samoilenko, L. V.
Published: (2020)
Information and mathematical model of quantum communication channel state control processes
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
Tasks for information security risks management in making-decision process
by: Rodin, Y.S.
Published: (2018)
by: Rodin, Y.S.
Published: (2018)
Consideration of the geometry of corrosion-fatigue cracks in assessing residual life of long-term operation objects
by: Ye. I. Kryzhanivskyi, et al.
Published: (2018)
by: Ye. I. Kryzhanivskyi, et al.
Published: (2018)
Method of information and analytical support for information security risk management of information systems
by: Rodin, Y.S.
Published: (2019)
by: Rodin, Y.S.
Published: (2019)
Hygienic assessment of magnetic fields in different methods of arc welding
by: Levchenko, Oleg H., et al.
Published: (2024)
by: Levchenko, Oleg H., et al.
Published: (2024)
Assessment of energy potential of agricultural residues
by: I. I. Hryhoruk
Published: (2019)
by: I. I. Hryhoruk
Published: (2019)
Risks assessment during operation of objects of gas transmission system’s infrastructure
by: Соловей, Виктор Васильевич, et al.
Published: (2015)
by: Соловей, Виктор Васильевич, et al.
Published: (2015)
Risks assessment during operation of objects of gas transmission system’s infrastructure
by: Соловей, Виктор Васильевич, et al.
Published: (2015)
by: Соловей, Виктор Васильевич, et al.
Published: (2015)
power efficiency, power intensity of products, the division of general power, multifood production.
by: Kuts G.O.
Published: (2010)
by: Kuts G.O.
Published: (2010)
Study of principles, models and methods of FAIR paradigm of scientific data management for analysis for BIG data metadata
by: Rogushina, J.V., et al.
Published: (2022)
by: Rogushina, J.V., et al.
Published: (2022)
COMPREHENSIVE ASSESSMENT OF MEASURES TO REDUCE ATMOSPHERIC POLLUTANT EMISSIONS
by: Maliarenko, Olena, et al.
Published: (2025)
by: Maliarenko, Olena, et al.
Published: (2025)
Modeling technology based on fuzzy object-oriented Bayesian belief networks
by: Yershov, S.V., et al.
Published: (2018)
by: Yershov, S.V., et al.
Published: (2018)
Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
by: Гальчинський, Л. Ю., et al.
Published: (2025)
by: Гальчинський, Л. Ю., et al.
Published: (2025)
Similar Items
-
Methods on determination of the output data for assessing residual risks with ensuring the confidentiality of information objects
by: V. S. Vasylenko, et al.
Published: (2017) -
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015) -
Increasing the channel capacity of a part of telecommunivation network at the expense of space-energy multiplexing
by: Anakhov, P. V.
Published: (2017) -
Privacy, confidentiality and security of personal data
by: V. M. Bryzhko, et al.
Published: (2020) -
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)