图书馆订阅: Guest
Begell Digital Portal Begell 数字图书馆 电子图书 期刊 参考文献及会议录 研究收集
电信和无线电工程
SJR: 0.203 SNIP: 0.44 CiteScore™: 1

ISSN 打印: 0040-2508
ISSN 在线: 1943-6009

卷:
卷 79, 2020 卷 78, 2019 卷 77, 2018 卷 76, 2017 卷 75, 2016 卷 74, 2015 卷 73, 2014 卷 72, 2013 卷 71, 2012 卷 70, 2011 卷 69, 2010 卷 68, 2009 卷 67, 2008 卷 66, 2007 卷 65, 2006 卷 64, 2005 卷 63, 2005 卷 62, 2004 卷 61, 2004 卷 60, 2003 卷 59, 2003 卷 58, 2002 卷 57, 2002 卷 56, 2001 卷 55, 2001 卷 54, 2000 卷 53, 1999 卷 52, 1998 卷 51, 1997

电信和无线电工程

DOI: 10.1615/TelecomRadEng.v66.i15.80
pages 1403-1413

The Use of the Threat Setting Method on a Set of Information Safety Primitive Attributes in Assessing Efficacy of Its Protection

V. V. Miroshnikov
Federal State Research Testing Institute of Problems of Technical Protection of Information, Federal Service on Technical and Export Control, Voronezh, Russian Federation

ABSTRACT

A method for identification of a set of information safety threats that can be applied to an information facility by a typical threat formation graph on a finite set of independent information safety primitive attributes is analyzed. Independence of primitive attributes follows from the fact that the sets of vulnerabilities on which they are determined do not intersect. This method ensures minimization of labor content in assessing efficacy of information protection, as well as of assessment subjectiveness.


Articles with similar content:

On Scalarization of a Class of Vector Optimization Problems in the Banach Spaces
Journal of Automation and Information Sciences, Vol.40, 2008, issue 12
Igor V. Nechay, Peter I. Kogut
Hybrid Approach to Clustering Various Lengths Video
Journal of Automation and Information Sciences, Vol.51, 2019, issue 3
Mikhail І. Stolbovoi, Sergey V. Mashtalir, Sergey V. Yakovlev
METHOD FOR BUILDING OF LOGICAL DATA TRANSFORM IN THE PROBLEM OF ESTABLISHING LINKS BETWEEN THE OBJECTS IN INTELLECTUAL TELECOMMUNICATION SYSTEMS
Telecommunications and Radio Engineering, Vol.75, 2016, issue 18
V. A. Gorokhovatskiy, G. G. Chetverikov, I. D. Vechirska
IMAGE CLASSIFICATION METHODS IN THE SPACE OF DESCRIPTIONS IN THE FORM OF A SET OF THE KEY POINT DESCRIPTORS
Telecommunications and Radio Engineering, Vol.77, 2018, issue 9
Volodymyr A. Gorokhovatskyi
IMPROVING AN ALGORITHM FOR DETECTION OF URGENT THREATS TO SECURITY OF PERSONAL DATA WHEN THEY ARE PROCESSED IN INFORMATION SYSTEMS OF PERSONAL DATA
Telecommunications and Radio Engineering, Vol.71, 2012, issue 5
I. G. Nazarov, Yu. K. Yazov, E. S. Ostroukhova