2019
DOI: 10.15587/1729-4061.2019.169527
|View full text |Cite
|
Sign up to set email alerts
|

Development of a methodology for building an information security system in the corporate research and education system in the context of university autonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…The advantages of system-dynamic modeling also speak in favor of this choice. The methodology of system-dynamic modeling allows [62][63][64][65]:…”
Section: Discussion Of the Results Of Game-theoretic Modeling Of The Security System Agents Behavior Processesmentioning
confidence: 99%
“…The advantages of system-dynamic modeling also speak in favor of this choice. The methodology of system-dynamic modeling allows [62][63][64][65]:…”
Section: Discussion Of the Results Of Game-theoretic Modeling Of The Security System Agents Behavior Processesmentioning
confidence: 99%
“…This cyberattack can be in the form of DDoS on the Power Grid [24], Web attack [31], or attack the point of Sale (POS) [30]. Apart from cyberattacks, there are also External attacks [33,34], Insider Threat [35,36], Unauthorized Access [37,38], Targeted attacks [39,40], Hybrid Threats [41], Hazardous Event [42], Nature Disasters [43], Social Engineering [44], Falsification Attacks [45], Breach Attack [46], Data Theft [47], and Data Tampering [48] commonly found in CIIP. If we quote directly from the literature, vulnerability also has many terms.…”
Section: Data Extractionmentioning
confidence: 99%
“…-reflection of the purposefulness of agents' behavior, as well as the agents' ability to formulate their goals in the model; -ability to simulate both the behavior of an individual agent and the interaction between different agents that make up the model; -learning ability of agents. In [22][23][24], the authors propose approaches to assess the quality of service based on multifactor analysis and the current state of information security of the organization. However, possible preventive actions based on modeling and evaluating the capabilities of both the attacker and the defense side are not taken into account.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%