2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) 2020
DOI: 10.1109/eiconrus49466.2020.9038960
|View full text |Cite
|
Sign up to set email alerts
|

The Development of Method for Evaluation of Information Security Threats in Critical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…The existence of vulnerabilities gives way to threats, which can be external or internal. The threat assessment process is the biggest problem in information security, because the source of vulnerability and threat in an information system can be hidden until the attack begins, ASTESJ ISSN: 2415-6698 which generates insufficient security controls that generate a high level of risk to the organization [5]. To minimize the availability of threats and vulnerabilities in organizations, the risk assessment process is defined, which must be carried out by an expert [6].…”
Section: Introductionmentioning
confidence: 99%
“…The existence of vulnerabilities gives way to threats, which can be external or internal. The threat assessment process is the biggest problem in information security, because the source of vulnerability and threat in an information system can be hidden until the attack begins, ASTESJ ISSN: 2415-6698 which generates insufficient security controls that generate a high level of risk to the organization [5]. To minimize the availability of threats and vulnerabilities in organizations, the risk assessment process is defined, which must be carried out by an expert [6].…”
Section: Introductionmentioning
confidence: 99%