Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
The paper analyzes the trends in threats to the functioning of information and telecommunication systems and methodological issues of evaluating the effectiveness of the information security system for protected objects. Based on the results of the analysis, a methodology for assessing the state of...
Saved in:
| Date: | 2019 |
|---|---|
| Main Authors: | Chepkov, Ihor B., Zubariev, Valerii V., Sverhunov, Oleksandr O., Zubariev, Oleksandr V. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Kyiv National University of Construction and Architecture
2019
|
| Subjects: | |
| Online Access: | https://es-journal.in.ua/article/view/172547 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Environmental safety and natural resources |
Institution
Environmental safety and natural resourcesSimilar Items
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Security of decision support systems based on decentralized data platforms
by: Савченко, М. М.
Published: (2023)
by: Савченко, М. М.
Published: (2023)
Building of a System for Monitoring, Adaptive Aggregation and Generalization of Information
by: Dodonov, A. G., et al.
Published: (2013)
by: Dodonov, A. G., et al.
Published: (2013)
Technology for ensuring the survivability of territorially distributed information computer systems in a unified information space
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Information systems for observation of marine aquatories and adjacent areas using aerospace technologies
by: Volynets, Taras, et al.
Published: (2025)
by: Volynets, Taras, et al.
Published: (2025)
Quality analysis of information control systems of oil refining industries Justification of the need to implement information management systems of enterprises of the oil refining industry
by: Охріменко, Т. О., et al.
Published: (2021)
by: Охріменко, Т. О., et al.
Published: (2021)
Mеthodological Aspects of Creating Heightened Survivability Corporative Information Ana-lytical Systems
by: Dodonov, О. G., et al.
Published: (2012)
by: Dodonov, О. G., et al.
Published: (2012)
Territorially distributed information computer systems in a unified information space: basic concepts and definitions
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Information-Technology Approach to Complex Substantiation of Requirements for Automated Systems
by: Самохвалов, Ю. Я., et al.
Published: (2012)
by: Самохвалов, Ю. Я., et al.
Published: (2012)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Information technologies of application architecture`s IT services
by: Dovgiy, Stanislav O., et al.
Published: (2023)
by: Dovgiy, Stanislav O., et al.
Published: (2023)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Information technologies for environmental monitoring of landfills using remotely piloted aircraft
by: Shevchuk, Oleksandr
Published: (2025)
by: Shevchuk, Oleksandr
Published: (2025)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Application of the markov model in information technology of the formation of the local socio-economic system
by: Sholokhov, Oleksii, et al.
Published: (2025)
by: Sholokhov, Oleksii, et al.
Published: (2025)
Improvement of the method of semiotic analysis of materials for detection of informational-psychological impact
by: Trofymchuk, Oleksandr, et al.
Published: (2025)
by: Trofymchuk, Oleksandr, et al.
Published: (2025)
Modelling and assessment of functional stability of information systems
by: Додонов, О. Г., et al.
Published: (2025)
by: Додонов, О. Г., et al.
Published: (2025)
A methodology of detection of the event basis for information operations
by: Prishchepa, S. V.
Published: (2018)
by: Prishchepa, S. V.
Published: (2018)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Adaptation of Distributed Information Infrastructures for Government Bodies Interaction
by: Khramova, I. О.
Published: (2012)
by: Khramova, I. О.
Published: (2012)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Information technologies for decision support systems in regional development management
by: Prosyankina-Zharova, Tetyana
Published: (2025)
by: Prosyankina-Zharova, Tetyana
Published: (2025)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Ontology based systemazing of the science information devoted to waste utilizing by methanogenesys
by: Shapovalov, Ye.B., et al.
Published: (2018)
by: Shapovalov, Ye.B., et al.
Published: (2018)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Detection of information sources distributing fake information inside global internet network
by: Soboliev, A. М.
Published: (2019)
by: Soboliev, A. М.
Published: (2019)
Similar Items
-
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012) -
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016) -
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015) -
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023) -
Security of decision support systems based on decentralized data platforms
by: Савченко, М. М.
Published: (2023)