Automation of standardized cyber insurance processes
The study aims to develop a cyber insurance model that includes the main requirements of international regulatory documents and provides for the automation of individual processes of cyber insurance.The objectives of the study are to analyze existing standards, business processes of insurance of ope...
Saved in:
| Date: | 2025 |
|---|---|
| Main Authors: | Khudyntsev, Mykola, Khomenko, Oleksii |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Kyiv National University of Construction and Architecture
2025
|
| Subjects: | |
| Online Access: | https://es-journal.in.ua/article/view/335837 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Environmental safety and natural resources |
Institution
Environmental safety and natural resourcesSimilar Items
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Actual problems of long-term preservation of documentation in insurance fund of documentation of Ukraine
by: Podorozhnyi, V. I.
Published: (2016)
by: Podorozhnyi, V. I.
Published: (2016)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
by: Гальчинський, Л. Ю., et al.
Published: (2025)
by: Гальчинський, Л. Ю., et al.
Published: (2025)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022)
by: Додонов, О. Г., et al.
Published: (2022)
Management and Cost Analysis of Insurance-Based Social Benefits in the Republic of Azerbaijan
by: Alirzayev, Emin
Published: (2025)
by: Alirzayev, Emin
Published: (2025)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
Some issues of registration and reproduction of information touching upon objects of material and spiritual culture using technologies of the state insurance documentation fund of Ukraine.
by: Babenko, V. V., et al.
Published: (2019)
by: Babenko, V. V., et al.
Published: (2019)
Information-Technology Approach to Complex Substantiation of Requirements for Automated Systems
by: Самохвалов, Ю. Я., et al.
Published: (2012)
by: Самохвалов, Ю. Я., et al.
Published: (2012)
Information technologies for automation of hyddrophisical situation molelling and forecasting in the Black Sea region
by: Shyptsov, Oleksandr A., et al.
Published: (2023)
by: Shyptsov, Oleksandr A., et al.
Published: (2023)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Financial risk management with taking account of information
by: Kuznietsova, N. V.
Published: (2018)
by: Kuznietsova, N. V.
Published: (2018)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Ontological approach to the organization of information interaction of existing and created automated systems in the Ministry of Defense and the Armed Forces of Ukraine
by: Гречанінов , В. Ф.
Published: (2021)
by: Гречанінов , В. Ф.
Published: (2021)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Industrial Process Automation and Business Technology Management: A Cobb–Douglas Elasticity Perspective
by: Tomov, Pancho, et al.
Published: (2025)
by: Tomov, Pancho, et al.
Published: (2025)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Usage of intellectual analysis of ecological-economic data in the pension insurance system and for forecasting expenditures on social protection and social security
by: Zarudnii, Oleksii B.
Published: (2024)
by: Zarudnii, Oleksii B.
Published: (2024)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Quality analysis of information control systems of oil refining industries Justification of the need to implement information management systems of enterprises of the oil refining industry
by: Охріменко, Т. О., et al.
Published: (2021)
by: Охріменко, Т. О., et al.
Published: (2021)
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
AUTOMATED CALCULATIONS OF THE DYNAMICS OF TURBOGENERATOR ELECTROMAGNETIC PROCESSES IN SOFTWARE ENVIRONMENT FEMM
by: Milykh, V. I., et al.
Published: (2015)
by: Milykh, V. I., et al.
Published: (2015)
Methodical Aspects of the Conceptual Design of Automated Systems
by: Samokhvalov, Yu. Ya., et al.
Published: (2012)
by: Samokhvalov, Yu. Ya., et al.
Published: (2012)
The process of dangerous event management taking into account economic, environmental and occupational losses
by: Tsopa, Vitaliy A., et al.
Published: (2024)
by: Tsopa, Vitaliy A., et al.
Published: (2024)
Software system for automated data interpretation of potential fields (GMT-Auto)
by: Starostenko, V. I., et al.
Published: (2015)
by: Starostenko, V. I., et al.
Published: (2015)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Risk analysis in the organization, planning, implementation and support of R&D by standard simulation tools of Excel
by: Dodonov, O. G., et al.
Published: (2020)
by: Dodonov, O. G., et al.
Published: (2020)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Analysis of the Status and Functional Requirements for Modern Engineering Solutions to Create Automated Systems for Personnel Management
by: Khramova, I. О.
Published: (2012)
by: Khramova, I. О.
Published: (2012)
Armed conflict as an environmental risk factor at water supply facilities in еastern Ukraine (case study of “Voda Donbassa” utility company’s Siverskyi Donets – Donbas canal)
by: Buglak, Olexandra V., et al.
Published: (2019)
by: Buglak, Olexandra V., et al.
Published: (2019)
From the idea to the creation of an automated interpretation system of potential fields GMT-AUTO: step by step
by: Makarenko, I.B., et al.
Published: (2025)
by: Makarenko, I.B., et al.
Published: (2025)
Automated water level monitoring system in open water
by: Lepikh, Ya. I., et al.
Published: (2019)
by: Lepikh, Ya. I., et al.
Published: (2019)
Researches of characteristics of domestic radiopaque fabrics H1, H2 and H3 with the use of different combinations of theirs
by: Yaremchuk, Yu. E., et al.
Published: (2016)
by: Yaremchuk, Yu. E., et al.
Published: (2016)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Similar Items
-
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025) -
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024) -
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021) -
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017) -
Actual problems of long-term preservation of documentation in insurance fund of documentation of Ukraine
by: Podorozhnyi, V. I.
Published: (2016)