Abonnement à la biblothèque: Guest
Portail numérique Bibliothèque numérique eBooks Revues Références et comptes rendus Collections
Telecommunications and Radio Engineering
SJR: 0.202 SNIP: 0.2 CiteScore™: 0.23

ISSN Imprimer: 0040-2508
ISSN En ligne: 1943-6009

Volumes:
Volume 78, 2019 Volume 77, 2018 Volume 76, 2017 Volume 75, 2016 Volume 74, 2015 Volume 73, 2014 Volume 72, 2013 Volume 71, 2012 Volume 70, 2011 Volume 69, 2010 Volume 68, 2009 Volume 67, 2008 Volume 66, 2007 Volume 65, 2006 Volume 64, 2005 Volume 63, 2005 Volume 62, 2004 Volume 61, 2004 Volume 60, 2003 Volume 59, 2003 Volume 58, 2002 Volume 57, 2002 Volume 56, 2001 Volume 55, 2001 Volume 54, 2000 Volume 53, 1999 Volume 52, 1998 Volume 51, 1997

Telecommunications and Radio Engineering

DOI: 10.1615/TelecomRadEng.v66.i15.80
pages 1403-1413

The Use of the Threat Setting Method on a Set of Information Safety Primitive Attributes in Assessing Efficacy of Its Protection

V. V. Miroshnikov
Federal State Research Testing Institute of Problems of Technical Protection of Information, Federal Service on Technical and Export Control, Voronezh, Russian Federation

RÉSUMÉ

A method for identification of a set of information safety threats that can be applied to an information facility by a typical threat formation graph on a finite set of independent information safety primitive attributes is analyzed. Independence of primitive attributes follows from the fact that the sets of vulnerabilities on which they are determined do not intersect. This method ensures minimization of labor content in assessing efficacy of information protection, as well as of assessment subjectiveness.


Articles with similar content:

Synthesis of Robust Constrained Inventory Control in Supply Networks on the Base of Descriptor System Approach
Journal of Automation and Information Sciences, Vol.49, 2017, issue 5
Leonid M. Lyubchyk , Yuriy I. Dorofieiev
Multicriterion Design of Multiservice Communication Networks
Telecommunications and Radio Engineering, Vol.69, 2010, issue 1
K. I. Sychev
Vector Assessment of Problematic Situations
Journal of Automation and Information Sciences, Vol.48, 2016, issue 5
Igor D. Varlamov, Albert N. Voronin
Construction, Identification, and Analysis of Stability of Linear Linguistic Control Systems
Journal of Automation and Information Sciences, Vol.31, 1999, issue 4-5
A. Yu. Sokolov
The Integration of Heterogeneous Enterprise Business Models
Journal of Automation and Information Sciences, Vol.44, 2012, issue 7
Pavel P. Maslianko , Alexander S. Maistrenko