2025-02-23T14:14:53-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22journaliasakpiua-article-52091%22&qt=morelikethis&rows=5
2025-02-23T14:14:53-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22journaliasakpiua-article-52091%22&qt=morelikethis&rows=5
2025-02-23T14:14:53-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-23T14:14:53-05:00 DEBUG: Deserialized SOLR response
Кореляція витрат у багаторубіжних системах захисту інформації
Economic optimization problems of information security are aimed at addressing two major problems: determining the optimal amount of investment in information security, which provides the best economic performance and optimizing the resource allocation between objects. The transition to multilevel m...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | Ukrainian |
Published: |
The National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"
2015
|
Online Access: | http://journal.iasa.kpi.ua/article/view/52091 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Economic optimization problems of information security are aimed at addressing two major problems: determining the optimal amount of investment in information security, which provides the best economic performance and optimizing the resource allocation between objects. The transition to multilevel multi-barrier systems significantly expands the problem and raises a number of issues arising from the complexity of the structure and physical layout of individual items. We consider a series-parallel layout of obstacles, which contains common obstacles for all objects and individual obstacles. The feasibility of introducing of an additional obstacle at the constant information security budget, depending on vulnerabilities of obstacles and the information distribution between objects, was analyzed. The method was developed and the results of calculations of optimal allocation of resources between the common and individual barriers were presented. Conditions of correlation were considered between the optimal allocation of resources aimed at individual obstacles. The results may be useful in developing recommendations for the creation of optimal information security systems and the resources management. |
---|