Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
Saved in:
| Date: | 2019 |
|---|---|
| Main Authors: | V. V. Mokhor, S. F. Honchar |
| Format: | Article |
| Language: | English |
| Published: |
2019
|
| Series: | Electronic modeling |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001070053 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023)
by: Ya. S. Manuilov
Published: (2023)
Methods for the total risk assessment of cybersecurity of critical infrastructure facilities
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Complex approach for state critical information infrastructure cyber defence system constructing
by: I. P. Sinitsyn, et al.
Published: (2017)
by: I. P. Sinitsyn, et al.
Published: (2017)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Requirements for a Cyber Threat Taxonomy of Critical Infrastructure Objects and Analysis of Existing Approaches
by: Yu. Komarov
Published: (2020)
by: Yu. Komarov
Published: (2020)
The relationship between information security and cyber security
by: A. V. Tarasiuk
Published: (2019)
by: A. V. Tarasiuk
Published: (2019)
Cyber security graph model of information resources
by: A. V. Nesterenko, et al.
Published: (2020)
by: A. V. Nesterenko, et al.
Published: (2020)
Review of Cyberatakes on Objects of Critical Infrastructure
by: Yu. Komarov
Published: (2019)
by: Yu. Komarov
Published: (2019)
Risks of the Country's Critical Infrastructure
by: S. V. Mahdysiuk
Published: (2024)
by: S. V. Mahdysiuk
Published: (2024)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: O. V. Saliieva, et al.
Published: (2020)
by: O. V. Saliieva, et al.
Published: (2020)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: O. V. Saliieva, et al.
Published: (2020)
by: O. V. Saliieva, et al.
Published: (2020)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: A. V. Davydiuk, et al.
Published: (2021)
by: A. V. Davydiuk, et al.
Published: (2021)
Research of Validity of Presentation of Risks by Vectors in the Euclide Space
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Features for providing of cyber security
by: M. M. Prysiazhniuk, et al.
Published: (2017)
by: M. M. Prysiazhniuk, et al.
Published: (2017)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Analysis of scenarios of the use of unmanned aircraft against critical infrastructure objects
by: M. M. Diviziniuk, et al.
Published: (2024)
by: M. M. Diviziniuk, et al.
Published: (2024)
Current US experience in cyber security
by: S. M. Stezhko, et al.
Published: (2021)
by: S. M. Stezhko, et al.
Published: (2021)
Overview of novels of domestic legislation in the field of cyber security (on the example of the Cyber Security Strategy of Ukraine for 2021 – 2025)
by: Ya. S. Manuilov
Published: (2021)
by: Ya. S. Manuilov
Published: (2021)
Improving the security of critical infrastructures through automated organizational management systems
by: O. H. Dodonov, et al.
Published: (2022)
by: O. H. Dodonov, et al.
Published: (2022)
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022)
by: Додонов, О. Г., et al.
Published: (2022)
Issue of Criminal Liability for Offences Against Critical Infrastructure Objects in Nuclear Industry
by: O. V. Taran, et al.
Published: (2019)
by: O. V. Taran, et al.
Published: (2019)
Administrative and legal protection of critical information infrastructure in cyberspace modern
by: Yu. P. Lisovska
Published: (2019)
by: Yu. P. Lisovska
Published: (2019)
Development of methodical support of antiterrorist protection of the objects of critical infrastructure (on the example of the USA)
by: B. D. Leonov, et al.
Published: (2020)
by: B. D. Leonov, et al.
Published: (2020)
Theoretical and methodological preconditions of categorisation of objects of critical infrastructure in credit and banking sphere
by: Yu. A. Ivanov
Published: (2019)
by: Yu. A. Ivanov
Published: (2019)
Advanced information technologies for the training of cyber defence specialists of the security and defence sector of Ukraine
by: O. M. Bashkyrov, et al.
Published: (2024)
by: O. M. Bashkyrov, et al.
Published: (2024)
Threat assessment mathematical model for potentially dangerous objects of critical infrastructure in the combat zone
by: Murasov, R.K., et al.
Published: (2023)
by: Murasov, R.K., et al.
Published: (2023)
Risks assessment during operation of objects of gas transmission system’s infrastructure
by: Соловей, Виктор Васильевич, et al.
Published: (2015)
by: Соловей, Виктор Васильевич, et al.
Published: (2015)
Risks assessment during operation of objects of gas transmission system’s infrastructure
by: Соловей, Виктор Васильевич, et al.
Published: (2015)
by: Соловей, Виктор Васильевич, et al.
Published: (2015)
Legal and organizational provision of protection of the critical information infrastructure from cyberattacks
by: S. M. Tsiapa
Published: (2021)
by: S. M. Tsiapa
Published: (2021)
Information security as an object of crime
by: A. V. Landina
Published: (2016)
by: A. V. Landina
Published: (2016)
Information in the natural cyber systems (to definition of the term information)
by: Ja. Reshetnik
Published: (2020)
by: Ja. Reshetnik
Published: (2020)
Corporate cyber security culture for scientific and research institutions
by: O. D. Dovhan, et al.
Published: (2018)
by: O. D. Dovhan, et al.
Published: (2018)
Combating cyber security threats on a global level
by: O. D. Dovhan, et al.
Published: (2020)
by: O. D. Dovhan, et al.
Published: (2020)
The cybersecurity modeling in critical infrastructures
by: H. Kravtsov, et al.
Published: (2015)
by: H. Kravtsov, et al.
Published: (2015)
The Essence of the Concept of "Critical Infrastructure” From the Standpoint of National Security of Ukraine
by: M. O. Kyzym, et al.
Published: (2022)
by: M. O. Kyzym, et al.
Published: (2022)
Integration of Different Approaches to the Modeling of Critical Infrastructure
by: I. M. Oksanych, et al.
Published: (2024)
by: I. M. Oksanych, et al.
Published: (2024)
Protection of Critical infrastructure Objects of Ukraine against Direct Missile Hits Using Underground Structures
by: V. I. Kotsiuruba, et al.
Published: (2023)
by: V. I. Kotsiuruba, et al.
Published: (2023)
Similar Items
-
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023) -
Methods for the total risk assessment of cybersecurity of critical infrastructure facilities
by: V. V. Mokhor, et al.
Published: (2019) -
Complex approach for state critical information infrastructure cyber defence system constructing
by: I. P. Sinitsyn, et al.
Published: (2017) -
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018) -
Requirements for a Cyber Threat Taxonomy of Critical Infrastructure Objects and Analysis of Existing Approaches
by: Yu. Komarov
Published: (2020)