Automation of standardized cyber insurance processes
The study aims to develop a cyber insurance model that includes the main requirements of international regulatory documents and provides for the automation of individual processes of cyber insurance.The objectives of the study are to analyze existing standards, business processes of insurance of ope...
Saved in:
| Date: | 2025 |
|---|---|
| Main Authors: | Khudyntsev, Mykola, Khomenko, Oleksii |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Kyiv National University of Construction and Architecture
2025
|
| Subjects: | |
| Online Access: | https://es-journal.in.ua/article/view/335837 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Environmental safety and natural resources |
Institution
Environmental safety and natural resourcesSimilar Items
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Actual problems of long-term preservation of documentation in insurance fund of documentation of Ukraine
by: Podorozhnyi, V. I.
Published: (2016)
by: Podorozhnyi, V. I.
Published: (2016)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022)
by: Додонов, О. Г., et al.
Published: (2022)
Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
by: Гальчинський, Л. Ю., et al.
Published: (2025)
by: Гальчинський, Л. Ю., et al.
Published: (2025)
Financial risk management with taking account of information
by: Kuznietsova, N. V.
Published: (2018)
by: Kuznietsova, N. V.
Published: (2018)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Some issues of registration and reproduction of information touching upon objects of material and spiritual culture using technologies of the state insurance documentation fund of Ukraine.
by: Babenko, V. V., et al.
Published: (2019)
by: Babenko, V. V., et al.
Published: (2019)
Semantic approach to automated formation of information security systems documentation
by: Bova, Yu.V., et al.
Published: (2026)
by: Bova, Yu.V., et al.
Published: (2026)
The process of dangerous event management taking into account economic, environmental and occupational losses
by: Tsopa, Vitaliy A., et al.
Published: (2024)
by: Tsopa, Vitaliy A., et al.
Published: (2024)
Information-Technology Approach to Complex Substantiation of Requirements for Automated Systems
by: Самохвалов, Ю. Я., et al.
Published: (2012)
by: Самохвалов, Ю. Я., et al.
Published: (2012)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Management and Cost Analysis of Insurance-Based Social Benefits in the Republic of Azerbaijan
by: Alirzayev, Emin
Published: (2025)
by: Alirzayev, Emin
Published: (2025)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Information technologies for automation of hyddrophisical situation molelling and forecasting in the Black Sea region
by: Shyptsov, Oleksandr A., et al.
Published: (2023)
by: Shyptsov, Oleksandr A., et al.
Published: (2023)
Development of decision support system using OLAP-technologies for information security monitoring systems
by: Dashdamirova, K.Q.
Published: (2023)
by: Dashdamirova, K.Q.
Published: (2023)
Tasks for information security risks management in making-decision process
by: Rodin, Y.S.
Published: (2018)
by: Rodin, Y.S.
Published: (2018)
Quality analysis of information control systems of oil refining industries Justification of the need to implement information management systems of enterprises of the oil refining industry
by: Охріменко, Т. О., et al.
Published: (2021)
by: Охріменко, Т. О., et al.
Published: (2021)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Industrial Process Automation and Business Technology Management: A Cobb–Douglas Elasticity Perspective
by: Tomov, Pancho, et al.
Published: (2025)
by: Tomov, Pancho, et al.
Published: (2025)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Software system for automated data interpretation of potential fields (GMT-Auto)
by: Starostenko, V. I., et al.
Published: (2015)
by: Starostenko, V. I., et al.
Published: (2015)
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Ontological approach to the organization of information interaction of existing and created automated systems in the Ministry of Defense and the Armed Forces of Ukraine
by: Гречанінов , В. Ф.
Published: (2021)
by: Гречанінов , В. Ф.
Published: (2021)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Methodical Aspects of the Conceptual Design of Automated Systems
by: Samokhvalov, Yu. Ya., et al.
Published: (2012)
by: Samokhvalov, Yu. Ya., et al.
Published: (2012)
Usage of intellectual analysis of ecological-economic data in the pension insurance system and for forecasting expenditures on social protection and social security
by: Zarudnii, Oleksii B.
Published: (2024)
by: Zarudnii, Oleksii B.
Published: (2024)
Similar Items
-
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025) -
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020) -
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024) -
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018) -
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)