2017
DOI: 10.5815/ijisa.2017.12.05
|View full text |Cite
|
Sign up to set email alerts
|

Method for Optimization of Information Security Systems Behavior under Conditions of Influences

Abstract: Abstract-The paper analyzes modern methods of modeling impacts on information systems, which made it possible to determine the most effective approaches and use them to optimize the parameters of security systems. And also as a method to optimize data security, taking in the security settings account (number of security measures, the type of security subsystems, safety resources and total cost information) allows to determine the optimal behavior in the -impact-security‖. Also developed special software that a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 43 publications
(9 citation statements)
references
References 1 publication
0
9
0
Order By: Relevance
“…That is, by the information security of Ukraine, we mean the corresponding state of security of the information space of our state, while special operations and acts of external aggression with information connotations, unauthorized access, and theft of information through the use of special technical means, cybercrime and similar destructive actions do not cause tangible damage to the interests of the country [3, p. 124; 4]. Thus, we can say that the information security [5,6] of the state is a set of effective mechanisms and measures of state bodies authorized to take appropriate actions in the information sphere, and their purpose is to protect the national security of the state (in our case, Ukraine).…”
Section: The сOncept Of Cybersecurity and Its Implications For The Aviation Sectormentioning
confidence: 99%
“…That is, by the information security of Ukraine, we mean the corresponding state of security of the information space of our state, while special operations and acts of external aggression with information connotations, unauthorized access, and theft of information through the use of special technical means, cybercrime and similar destructive actions do not cause tangible damage to the interests of the country [3, p. 124; 4]. Thus, we can say that the information security [5,6] of the state is a set of effective mechanisms and measures of state bodies authorized to take appropriate actions in the information sphere, and their purpose is to protect the national security of the state (in our case, Ukraine).…”
Section: The сOncept Of Cybersecurity and Its Implications For The Aviation Sectormentioning
confidence: 99%
“…A series of methods were developed in order to quantitatively describe risks, which employed both classic stochastic models [3,4] and the theory of fuzzy sets [5,6], and the game theory and simulation modeling [4,7,8].…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Information security systems are of great importance for business organizations as they become the main key to planning and management in modern enterprises to endure the safety, availability, and confidentiality of information [6,7]. The internal and external security threats made the international organizations seek to adopt specific security policy standards that draw up an integrated policy to put the concept of information security into practice at institutions, from analysis of risks to the application of security controls to minimize these risks [8,9].…”
Section: A Information Security Assessment: Standards and Modelsmentioning
confidence: 99%
“…Aggregate the pairwise comparison matrices of experts by using the fuzzy geometric mean method of Buckley (6) to take the average values to obtain the combined comparison matrix for the whole group of experts. The local weight vector of factors is determined by using formulas (7) to (9). Then it is normalized by using formula (10).…”
Section: The Proposed Model For Measuring Ismimentioning
confidence: 99%
See 1 more Smart Citation