Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс: http://e.ieu.edu.ua/handle/123456789/551
Название: Cybersecurity Graph Model of Information Resources
Авторы: Oleksandr, Nesterenko.;
Ключевые слова: cubersecurity;
information resources.;
threat,
risk,
ontology;
graphmodel.
Дата публикации: 2020
Издательство: Journal of Automation and Information Sciences
Библиографическое описание: Journal of Automation and Information Sciences, v.52,i.8,-2020,
Краткий осмотр (реферат): With the growing activity of cyberattacks on automated information systems, the task of determining the priority of building protective equipment is becoming increasingly relevant. The model for solving this problem, based on the ontological description and graph representation of the system security environment, is proposed. The ontologies of threats, resources (objects), and protection mechanisms are developed. The proposed approach is based on construction and partitioning of the graph of the relations of threats and system objects into subgraphs (subsystems) as connected components of the original graph with subsequent finding the relative risks of the damage of these subsystems within the overall system to find out the subsystems to which should be given priority to increasing their security level. The risk assessments of resource damage are determined based on expert threat scores and expert scores of the level of harm (loss) from damage. The algorithm has been developed by which the relative risks of subsystems are calculated. Analytical expressions are given and the example is used to calculate the risks of damage of the objects for the system without the partition into subsystems and taking into account the partition, to detect critical subsystems for protection. Application of the model gives a clearer picture of the interaction of threats and system resources, helps one to find the most significant vulnerabilities of the system and to look for ways to improve its security in the process of solving practical tasks to ensure cybersecurity. The performed calculations confirm the correctness and adequacy of the proposed model, its simplicity and ease of use, providing an effective tool for experts and developers of security systems for automated information systems.
URI (Унифицированный идентификатор ресурса): http://e.ieu.edu.ua/handle/123456789/551
Располагается в коллекциях:Кафедра менеджменту, фінансів та бізнес-адміністрування

Файлы этого ресурса:
Файл Описание РазмерФормат 
53 Cybersecurity Graph Model of Information Resources.pdf229.89 kBAdobe PDFОткрыть


Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.

Инструменты администратора