Automation of standardized cyber insurance processes
The study aims to develop a cyber insurance model that includes the main requirements of international regulatory documents and provides for the automation of individual processes of cyber insurance.The objectives of the study are to analyze existing standards, business processes of insurance of ope...
Saved in:
| Date: | 2025 |
|---|---|
| Main Authors: | Khudyntsev, Mykola, Khomenko, Oleksii |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Kyiv National University of Construction and Architecture
2025
|
| Subjects: | |
| Online Access: | https://es-journal.in.ua/article/view/335837 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Environmental safety and natural resources |
Institution
Environmental safety and natural resourcesSimilar Items
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Actual problems of long-term preservation of documentation in insurance fund of documentation of Ukraine
by: Podorozhnyi, V. I.
Published: (2016)
by: Podorozhnyi, V. I.
Published: (2016)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
Some issues of registration and reproduction of information touching upon objects of material and spiritual culture using technologies of the state insurance documentation fund of Ukraine.
by: Babenko, V. V., et al.
Published: (2019)
by: Babenko, V. V., et al.
Published: (2019)
Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
by: Гальчинський, Л. Ю., et al.
Published: (2025)
by: Гальчинський, Л. Ю., et al.
Published: (2025)
Management and Cost Analysis of Insurance-Based Social Benefits in the Republic of Azerbaijan
by: Alirzayev, Emin
Published: (2025)
by: Alirzayev, Emin
Published: (2025)
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022)
by: Додонов, О. Г., et al.
Published: (2022)
Tasks for information security risks management in making-decision process
by: Rodin, Y.S.
Published: (2018)
by: Rodin, Y.S.
Published: (2018)
Information-Technology Approach to Complex Substantiation of Requirements for Automated Systems
by: Самохвалов, Ю. Я., et al.
Published: (2012)
by: Самохвалов, Ю. Я., et al.
Published: (2012)
Financial risk management with taking account of information
by: Kuznietsova, N. V.
Published: (2018)
by: Kuznietsova, N. V.
Published: (2018)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Information technologies for automation of hyddrophisical situation molelling and forecasting in the Black Sea region
by: Shyptsov, Oleksandr A., et al.
Published: (2023)
by: Shyptsov, Oleksandr A., et al.
Published: (2023)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
The process of dangerous event management taking into account economic, environmental and occupational losses
by: Tsopa, Vitaliy A., et al.
Published: (2024)
by: Tsopa, Vitaliy A., et al.
Published: (2024)
Method of information and analytical support for information security risk management of information systems
by: Rodin, Y.S.
Published: (2019)
by: Rodin, Y.S.
Published: (2019)
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Ontological approach to the organization of information interaction of existing and created automated systems in the Ministry of Defense and the Armed Forces of Ukraine
by: Гречанінов , В. Ф.
Published: (2021)
by: Гречанінов , В. Ф.
Published: (2021)
Industrial Process Automation and Business Technology Management: A Cobb–Douglas Elasticity Perspective
by: Tomov, Pancho, et al.
Published: (2025)
by: Tomov, Pancho, et al.
Published: (2025)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Usage of intellectual analysis of ecological-economic data in the pension insurance system and for forecasting expenditures on social protection and social security
by: Zarudnii, Oleksii B.
Published: (2024)
by: Zarudnii, Oleksii B.
Published: (2024)
Risk analysis in the organization, planning, implementation and support of R&D by standard simulation tools of Excel
by: Dodonov, O. G., et al.
Published: (2020)
by: Dodonov, O. G., et al.
Published: (2020)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Quality analysis of information control systems of oil refining industries Justification of the need to implement information management systems of enterprises of the oil refining industry
by: Охріменко, Т. О., et al.
Published: (2021)
by: Охріменко, Т. О., et al.
Published: (2021)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Legal problems of insurance protection against cyber risks in space activities
by: N. D. Krasilich
Published: (2021)
by: N. D. Krasilich
Published: (2021)
Armed conflict as an environmental risk factor at water supply facilities in еastern Ukraine (case study of “Voda Donbassa” utility company’s Siverskyi Donets – Donbas canal)
by: Buglak, Olexandra V., et al.
Published: (2019)
by: Buglak, Olexandra V., et al.
Published: (2019)
Similar Items
-
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025) -
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020) -
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024) -
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018) -
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)