Method of information and analytical support for information security risk management of information systems
It has been tried to combine expert and statistics methods in analyzing information security risk. Author has brought general statements of information security risk management based on international and internal practices as well as proposed own risk analyzing process. The proposed method includes...
Saved in:
| Date: | 2019 |
|---|---|
| Main Author: | Rodin, Y.S. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
PROBLEMS IN PROGRAMMING
2019
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/337 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Tasks for information security risks management in making-decision process
by: Rodin, Y.S.
Published: (2018)
by: Rodin, Y.S.
Published: (2018)
Security basic model for applied tasks of the distributed information system
by: Rodin, Y.S., et al.
Published: (2021)
by: Rodin, Y.S., et al.
Published: (2021)
T-satisfiability test problem for the VL1 logical language of the VRS system
by: Timofeev, V.G.
Published: (2015)
by: Timofeev, V.G.
Published: (2015)
Modern technological aspects of decision support systems
by: Churubrova, S.M.
Published: (2017)
by: Churubrova, S.M.
Published: (2017)
Control models of data flows in Internet under instability
by: Ignatenko, O.P.
Published: (2025)
by: Ignatenko, O.P.
Published: (2025)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Method for calculating the parameters of phase transitions of discrete technological and information processes of strategic planning with parallelization of computations
by: Stepaniuk, M.Yu.
Published: (2025)
by: Stepaniuk, M.Yu.
Published: (2025)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Increase the temporal efficiency of data structures in memory based on adaptation
by: Shinkarenko, V.I., et al.
Published: (2015)
by: Shinkarenko, V.I., et al.
Published: (2015)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Mathematical foundations for designing and development of intelligent systems of information analysis
by: Terletskyi, D.O., et al.
Published: (2025)
by: Terletskyi, D.O., et al.
Published: (2025)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Algebraic patterns of binary code vulnerabilities
by: Yakovlev, V.M.
Published: (2020)
by: Yakovlev, V.M.
Published: (2020)
Multilevel additive-multiplicative model of generalized indicators assessment on the basis of balanced scorecard strategic management
by: Stepanuk, M.Y.
Published: (2025)
by: Stepanuk, M.Y.
Published: (2025)
Financial risk management with taking account of information
by: Kuznietsova, N. V.
Published: (2018)
by: Kuznietsova, N. V.
Published: (2018)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
The method of requirements prioritization in software engineering
by: Nesterenko, O.V.
Published: (2024)
by: Nesterenko, O.V.
Published: (2024)
Propositional logics of partial predicates with composition of predicate complement
by: Nikitchenko, M.S., et al.
Published: (2019)
by: Nikitchenko, M.S., et al.
Published: (2019)
The concept and evaluating of big data quality in the semantic environment
by: Novitsky, A.V.
Published: (2023)
by: Novitsky, A.V.
Published: (2023)
Logical consequence relations in logics of monotone predicates and logics of antitone predicates
by: Shkilniak, O.S.
Published: (2018)
by: Shkilniak, O.S.
Published: (2018)
Logical consequence relations in logics of quasiary predicates
by: Shkilniak, O.S.
Published: (2018)
by: Shkilniak, O.S.
Published: (2018)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Multiagent models based on fuzzy logic of the highest type for a high-performance environment
by: Parasyuk, I.N., et al.
Published: (2015)
by: Parasyuk, I.N., et al.
Published: (2015)
Information technology to ensure the survivability of sensor networks
by: Petrivskyi, V.Y., et al.
Published: (2022)
by: Petrivskyi, V.Y., et al.
Published: (2022)
First-order logics with partial predicates for checking variable definedness
by: Shkilniak, S.S.
Published: (2025)
by: Shkilniak, S.S.
Published: (2025)
First-order composition-nominative logics with predicates of weak equality and of strong equality
by: Shkilniak, S.S.
Published: (2019)
by: Shkilniak, S.S.
Published: (2019)
Special attention is given to the project of the Informational System "Planned for Science in the NAPN of Ukraine"
by: Zadorozhna, N.T., et al.
Published: (2015)
by: Zadorozhna, N.T., et al.
Published: (2015)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Technology for ensuring the survivability of territorially distributed information computer systems in a unified information space
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Semantic approach to automated formation of information security systems documentation
by: Bova, Yu.V., et al.
Published: (2026)
by: Bova, Yu.V., et al.
Published: (2026)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
Algebraic modeling in international and local service logistical systems
by: Letychevskyi, O.O., et al.
Published: (2021)
by: Letychevskyi, O.O., et al.
Published: (2021)
Pure first-order quasiary logics with equality predicates
by: Nikitchenko, M.S., et al.
Published: (2018)
by: Nikitchenko, M.S., et al.
Published: (2018)
Pure first-order logics of quasiary predicates
by: Nikitchenko, M.S., et al.
Published: (2018)
by: Nikitchenko, M.S., et al.
Published: (2018)
Algebras of general non-deterministic predicates
by: Nikitchenko, M.S., et al.
Published: (2018)
by: Nikitchenko, M.S., et al.
Published: (2018)
Improving of the effectiveness of in-formation provision of defense planning processes through the usage of parallel computing
by: Stepaniuk, M.Y., et al.
Published: (2017)
by: Stepaniuk, M.Y., et al.
Published: (2017)
Ontological methods and tools for semantic extension of the media WIKI technology
by: Rogushina, J.V., et al.
Published: (2020)
by: Rogushina, J.V., et al.
Published: (2020)
Similar Items
-
Tasks for information security risks management in making-decision process
by: Rodin, Y.S.
Published: (2018) -
Security basic model for applied tasks of the distributed information system
by: Rodin, Y.S., et al.
Published: (2021) -
T-satisfiability test problem for the VL1 logical language of the VRS system
by: Timofeev, V.G.
Published: (2015) -
Modern technological aspects of decision support systems
by: Churubrova, S.M.
Published: (2017) -
Control models of data flows in Internet under instability
by: Ignatenko, O.P.
Published: (2025)