2025-02-22T17:10:06-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22es-journalinua-article-172547%22&qt=morelikethis&rows=5
2025-02-22T17:10:06-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22es-journalinua-article-172547%22&qt=morelikethis&rows=5
2025-02-22T17:10:06-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-22T17:10:06-05:00 DEBUG: Deserialized SOLR response
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
The paper analyzes the trends in threats to the functioning of information and telecommunication systems and methodological issues of evaluating the effectiveness of the information security system for protected objects. Based on the results of the analysis, a methodology for assessing the state of...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | Ukrainian |
Published: |
Kyiv National University of Construction and Architecture
2019
|
Subjects: | |
Online Access: | https://es-journal.in.ua/article/view/172547 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The paper analyzes the trends in threats to the functioning of information and telecommunication systems and methodological issues of evaluating the effectiveness of the information security system for protected objects. Based on the results of the analysis, a methodology for assessing the state of the effectiveness of information security systems has been proposed. It is shown that the development of assessment methodologies should be carried out on the basis of statistical and system analysis using expert methods, taking into account the fact that the assessment of the effectiveness of information security systems and its components is assessed with a large number of uncertainties and differences. The approach of assessing the state of the effectiveness of information security systems for an object of protection based on the risk management of business processes has been analyzed. It is substantiated that, depending on the goals and objectives of the assessment, it is possible to change both the main factors and the second level assessment factors and calculate them based on expert assessments of third level factors that affect the level of information security. |
---|