PROBABLE APPROACH TO SAFETY ASSESSMENT INFORMATION FROM THREATS
DOI:
https://doi.org/10.31618/nas.2413-5291.2021.1.74.515Keywords:
information security threat assessment, quality, probabilistic approach.Abstract
It is well known that the main goal of information protection is to ensure a given level of its security. The specified level of information security is characterized by the state of its protection from threats, which provides an acceptable risk of its destruction, alteration, theft, and blocking.
Risks depend on the level of engineering and technical protection of information (ITZI), which is determined by the resources of the system. The more resource for information protection, the higher the level of security. With an unlimited resource, you can get an arbitrarily small probability of a threat being realized.
References
Gromov, Ju.Ju. Informacionnaja bezopasnost' i zashhita informacii: Uchebnoe posobie / Ju.Ju. Gromov, V.O. Drachev, O.G. Ivanova. — St. Oskol: TNT, 2017. - 384 c.
Zapechnikov, S.V. Informacionnaja bezopasnost' otkrytyh sistem. V 2-h t. T.2 — Sredstva zashhity v setjah / S.V. Zapechnikov, N.G. Miloslavskaja, A.I. Tolstoj, D.V. Ushakov. — M.: GLT, 2018. — 558 c.
Chipiga, A.F. Informacionnaja bezopasnost' avtomatizirovannyh sistem / A.F. Chipiga. — M.: Gelios ARV, 2017. — 336 c.
Shan'gin, V.F. Informacionnaja bezopasnost' komp'juternyh sistem i setej: Uchebnoe posobie / V.F. Shan'gin. — M.: ID FORUM, NIC INFRA-M, 2013. — 416 c.
Antonjuk L.Ja., Semisoshenko M.A. Adaptivnaja radiosvjaz' v sistemah svjazi special'nogo naznachenija // Jelektrosvjaz', 2007, №5, S. 17-20.
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
CC BY-ND
A work licensed in this way allows the following:
1. The freedom to use and perform the work: The licensee must be allowed to make any use, private or public, of the work.
2. The freedom to study the work and apply the information: The licensee must be allowed to examine the work and to use the knowledge gained from the work in any way. The license may not, for example, restrict "reverse engineering."
2. The freedom to redistribute copies: Copies may be sold, swapped or given away for free, in the same form as the original.