The 6th International Conference on Soft Computing and Intelligent Systems, and the 13th International Symposium on Advanced In 2012
DOI: 10.1109/scis-isis.2012.6505287
|View full text |Cite
|
Sign up to set email alerts
|

Methodology and ontology of expert system for information security audit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…This security mechanism will provide organizational guidelines, standards and component analysis that leads to issuance of the recommendations. Consequently, the supposed metamode of the security standard recommendations could be created (Atymtayeva et al, 2012;Kozhakhmet et al, 2012;Atymtayeva et al, 2011).…”
Section: Security Mechanism Implementationmentioning
confidence: 99%
“…This security mechanism will provide organizational guidelines, standards and component analysis that leads to issuance of the recommendations. Consequently, the supposed metamode of the security standard recommendations could be created (Atymtayeva et al, 2012;Kozhakhmet et al, 2012;Atymtayeva et al, 2011).…”
Section: Security Mechanism Implementationmentioning
confidence: 99%
“…−internal offenders who have the right to access the controlled area, but do not have access to the organization's information system (partners, clients); −external offenders who do not have the right to physical access to the controlled area and to the organization's IP (hackers, criminal structures). At the stage of forming the threat model, data from the intruder's model is received at the input, and at the output, destructive actions are generated for each object for each intruder [6][7]. From all possible destructive actions, many threats to information security are formed -{Х}.…”
Section: Organization Of Internal Audit Of Information Security In Organizationsmentioning
confidence: 99%