RT Journal Article ID 7a1e17ce79d04c98 A1 Miroshnikov, V. V. T1 The Use of the Threat Setting Method on a Set of Information Safety Primitive Attributes in Assessing Efficacy of Its Protection JF Telecommunications and Radio Engineering JO TRE YR 2007 FD 2007-11-08 VO 66 IS 15 SP 1403 OP 1413 AB A method for identification of a set of information safety threats that can be applied to an information facility by a typical threat formation graph on a finite set of independent information safety primitive attributes is analyzed. Independence of primitive attributes follows from the fact that the sets of vulnerabilities on which they are determined do not intersect. This method ensures minimization of labor content in assessing efficacy of information protection, as well as of assessment subjectiveness. PB Begell House LK https://www.dl.begellhouse.com/journals/0632a9d54950b268,106857ec0ed3e004,7a1e17ce79d04c98.html