?
Один из подходов к формализации описания угроз, уязвимостей и рисков системы защиты информации на предприятии
Национальная безопасность / nota bene. 2012. № 6. С. 60-68.
Tsaregorodtsev A. V., Тараскин М. М., Дербин Е. А.
One of the approaches to the assessment of threats, vulnerabilities and risks in the protection of information in organizations , allowing to fully analyze and document requirements related to information security in the organization. Using this approach will allow to avoid the costs of redundant safety measures arising from the subjective assessment of the risks to assist in planning and implementing protection at all stages of the life cycle of information systems, and ensure that work under tight deadlines. Practical recommendations for the choice of countermeasures and evaluate the effectiveness of countermeasures to compare their various options.
Priority areas:
IT and mathematics
Language:
Russian
Kasperskaya N., Защита информации. Инсайд 2019 № 3 С. 34-43
Big Data is a hot topic in high technology. At the same time, this topic does not correspond very often to the field of information security (IS), although initially the term “big data” was created to solve IS problems. Today, behavioral analysis systems implemented to prevent risks and threats to information security of enterprises are ...
Added: July 2, 2019
Тараскин М. М., Tsaregorodtsev A. V., М. : Академия ФСБ России, 2012
The monograph is devoted to the development of research methodology of threats, vulnerabilities and risks in information security in organizations. Substantiated mathematical apparatus of research: axiomatization of Boolean , which as most adequately describes the processes of mental activity in the construction of expert system model of information security in the organization and eliminates various ...
Added: March 20, 2014
Семин В.Г., Михеев В. А., Технологии электромагнитной совместимости 2013 Т. 47 № 4 С. 55-60
The paper discusses the main stages of solving problems of optimal organization of the system of risk management information and functional safety of multifunctional information systems (IFB IIA) on the basis of the principle of guaranteed result. The results of the decision of problems of modeling of the structure of the threats, indexing and optimization ...
Added: March 14, 2014
Ometov A., Bezzateev S., Voloshina N. et al., Sensors 2019 Vol. 19 No. 24 P. 1-19
Almost inevitable climate change and increasing pollution levels around the world are the most significant drivers for the environmental monitoring evolution. Recent activities in the field of wireless sensor networks have made tremendous progress concerning conventional centralized sensor networks known for decades. However, most systems developed today still face challenges while estimating the trade-off between ...
Added: February 2, 2020
Лазарев Д. В., Grachev N. N., Технологии электромагнитной совместимости 2013 № 3 С. 29-38
Basic provisions are presented in article concerning safety concerning electromagnetic radiations when functioning radio-electronic means of a radio coherent and radar profile of objects sea infrastructure. The description of scientific and methodical approach and program realization of an assessment of safety is given in objects of sea infrastructure. ...
Added: December 10, 2013
D.S. Kildishev, A.V. Khoroshilov., Proceedings of the Institute for System Programming of the RAS 2019 Vol. 30 No. 5 P. 163-176
Requirements play an important role in the process of safety critical software development. To achieve reasonable quality and cost ratio a tool support for requirements management is required. The paper presents a formal definition of a metamodel that is used as a basis of Requality requirements management tool. An experience of implementation of the meta ...
Added: October 17, 2019
Semin V. G., Khakimullin E. R., В кн. : Инновационные, информационные и коммуникационные технологии: сборник трудов XIII Международной научно-практической конференции. : М. : Ассоциация выпускников и сотрудников ВВИА им. проф. Жуковского, 2016. С. 136-138.
The report presents the results of a comparative analysis of logical and probabilistic safety threats structure modeling techniques. It is shown that general logic probabilistic method using the functional integrity of the scherme, is most preferred for use in the problems of the consolidated risk assessment. ...
Added: December 15, 2016
Zamotaeva O. A., Щепетова В. Н., Шамонина К. С., Мир транспорта 2016 Т. 14 № 4 С. 210-217
The article describes the types of risks associated primarily with fraud in organizations of inland water transport, methods for their detection and security management tools. In particular, it analyzes the characteristics and features of the most common threats, violations or crimes in the sphere of sea and river transportation, signs of abnormal practices, which might ...
Added: October 19, 2017
Semin V. G., Михеев В. А., Технологии электромагнитной совместимости 2014 Т. 51 № 4 С. 58-62
In the article the results of development of the main provisions of the security policy, concep-tual and formal structures of a system of electromagnetic security infoсommuniсation infrastructure multifunctional systems integrated structures of the military-industrial complex. ...
Added: March 13, 2015
Arzamasov Y., Государство и право 2019 № 8 С. 133-137
The review analyzes the content of the monograph by D.V. Iroshnikov “Safety as a legal category” (M, 2019). The novelty and relevance of this study for the Russian theoretical and legal science are emphasized. Attention is drawn to issues of practical significance, since the proposals developed in the monograph on legislative improvement of the norms ...
Added: September 23, 2019
Semenenko A. N., Kofanov Y. N., Rotkevich A. et al., Качество. Инновации. Образование 2015 № 12 С. 44-51
This article presents the method of thermal processes models construction оf radiators in subsystem ASONIKA-T, used for cooling electronic components power supply modules electronic means. This paper presents fragments of the model of radiator, designed in according to this method, results of the experiment and their comparison with the simulation’s data. Conclusions of the work ...
Added: December 22, 2015
СПб. : ГОУ ВПО «СПбГУ АП», 2014
Рассматриваются технологии и модели экономической безопасности России на основе Технологий Управления Риском в Структурно-Сложных Системах (ТУР ССС) с логико-вероятностными (ЛВ) моделями риска. Обсуждаются концепция управления экономической безопасностью России, новые типы булевых событий-высказываний для моделей социально-экономических систем (СЭС), новые типы моделей риска для управления экономической безопасностью СЭС, модели экономической безопасности России, апробация ТУР ССС для управления ...
Added: November 21, 2014
М. : МИЭМ, 2005
Представлены материалы второй научно-практической конференции, отражающие состояние информационных технологий и подходов к решению проблем качества, безопасности и диагностики.
Представляет интерес для широкого круга научных работников, преподавателей, аспирантов и студентов вузов, связанных с решением проблем информатизации; для специалистов в области современных информационных технологий. ...
Added: April 10, 2014
Анисимов В. Г., Анисимов Е. Г., Гарькушев А. Ю. et al., Известия Российской академии ракетных и артиллерийских наук 2015 № 4 С. 34-39
Article considers the solution of a problem of formation of the optimum plan of performance of a complex of the interconnected actions in interests of preparation of space systems. The offered model considers limitation, a variety, interchangeability, productivity and cost of renewable resources (performers) involved in the course of preparation. It provides minimization of time ...
Added: February 28, 2016
Afanasiev V., Крестникова Д. Г., Нейрокомпьютеры: разработка, применение 2009 № 9 С. 29-36
Приведен метод идентификации нестационарного объекта при помощи настройки параметров модели на основе прошлых измерений, которые проходят на фоне помех в виде гауссовского белого шума. Приведен также алгоритм построения линейного фильтра на основе фильтра Калмана. Представлены схемы моделирования в системе MATLAB Simulink. Приведены результаты идентификации при разных вариантах настройки параметров фильтра. ...
Added: March 18, 2013
Avdoshin S. M., Savelieva A., , in : Satellite Workshops & Doctoral Consortium. : Nizhny Novgorod : Higher School of Economics in Nizhny Novgorod, 2012. P. 157-168.
Today the demand is growing for information security experts capable of analyzing problems and making decisions in business situations that involve risk or uncertainty. These skills can be acquired through systematic studying of various information security incidents. In this paper we propose a framework of methods, tools and taxonomies for analysis of case studies in ...
Added: January 22, 2013
Vikentyeva O., Deryabin A. I., Shestakova L. V., Информатизация и связь 2014 № 1 С. 60-64
The paper suggests a formalized business game description technique, based on the information about company’s business process. The technique include sequential building of a model set that enables to acquire business game execution scenario. ...
Added: May 28, 2014
М. : МИЭМ, 2004
Представлены материалы первой научно-практической конференции, отражающие состояние информационных технологий и подходов к решению проблем качества, безопасности и диагностики.
Представляет интерес для широкого круга научных работников, преподавателей, аспирантов и студентов вузов, связанных с решением проблем информатизации; для специалистов в области современных информационных технологий. ...
Added: April 10, 2014
Levashov M., Бухгалтерия и банки 2020 № 3 С. 52-53
Исследуются недостатки созданной Единой биометрической системы (ЕБС). Предлагаются модификации, позволяющие субъектам ЕБС в определенной степни управлять своими данными, содержащимися в ЕБС. ...
Added: March 16, 2020
Marshirova L. E., Marshirov V. V., Экономический анализ: теория и практика 2015 № 48 С. 13-24
Importance. Unincorporated entrepreneurship is rather widespread, however, interesting business ideas often die because entrepreneurs have poor knowledge of legislation, are not competent in tax planning and, as a consequence, suffer losses and go bankrupt. Therefore, choosing a taxation system is of great significance and practical use for individual entrepreneurs.
Objectives. The study aims to develop a ...
Added: January 26, 2016
Zakharov V., Abbas M. M., Automatic Control and Computer Sciences, USA 2019 Vol. 53 No. 7 P. 589-606
Mathematical models of distributed computations, based on the calculus of mobile processes (pi-calculus) are widely used for checking the information security properties of cryptographic protocols. Since pi-calculus is Turing-complete, this problem is undecidable in general case. Therefore, the study is carried out only for some special classes of pi-calculus processes with restricted computational capabilities, for ...
Added: October 17, 2019
Volodin S. M., Makarov V. V., Датчики и системы 2002 № 1 С. 22-25
The technique of parallel widerange noise-immune measurement of frequency pulse signals is investigated. The estimates of measurement accuracy and speed are derived. ...
Added: March 28, 2013
Sandlerskiy R., Krenke A., Puzachenko Y. G. et al., Doklady Earth Sciences 2017 Vol. 475 P. 784-787
A new method of estimating the outgoing radiation spectra data obtained from the Hyperiоn EO-1 satellite is considered. In theoretical terms, this method is based on the nonequilibrium thermodynamics concept with corresponding estimates of the entropy and the Kullbak information. The obtained information estimates make it possible to assess the effective work of the landscape ...
Added: March 26, 2022
Avdoshin S. M., Pesotskaya E. Y., Информационные технологии 2008 № 11 С. 13-18
Implementation of IT and program projects seems to be very complicated and taught process, associated with many uncertainties and risks. Sure, this does not mean the rejection of such projects, supposed the more responsibility for the decision making process of new information technologies implementation. To manage various problems which face project managers, it makes sense ...
Added: October 3, 2012