GRAMOTA Publishers suggests publishing your scientific articles in periodicals
Pedagogy. Theory & PracticePhilology. Theory & PracticeManuscript

Archive of Scientific Articles

SOURCE:    Almanac of Modern Science and Education. Tambov: Gramota, 2013. № 11. P. 96-98.
SCIENTIFIC AREA:    Technical Sciences
Procedure of Scientific Articles Publication | To Show Issue Content | To Show All Articles in Section | Subject Index

License Agreement on scientific materials use.

RISKS MANAGEMENT METHODS WHILE ENSURING INFORMATION SECURITY

Leutskii Evgenii Aleksandrovich
Novosibirsk State University


Abstract. The article is devoted to working out the management methods of the risks arising while ensuring the information security of enterprises and organizations. The main research directions were the revelation of the distinctive features of the existing analysis and risks management systems and the analysis of the existing solutions and methods, and the efficiency of their use. The research base is a qualitatively new precedent approach, which was used for constructing the system of analysis and risks management (Risk Panel).
Key words and phrases: информационная безопасность, риск, угроза, уязвимость, информационная система, база знаний, прецедентный подход, модель угроз, онтология, Risk Panel, information security, risk, threat, vulnerability, information system, knowledge base, precedent approach
Open the whole article in PDF format. Free PDF-files viewer can be downloaded here.
References:
  1. Nesterov S. A. Analiz i upravlenie riskami v informatsionnykh sistemakh na baze operatsionnykh sistem Microsoft: uchebnyi kurs. SPb., 2009.
  2. Pal'chunov D. E. Poisk i izvlechenie znanii: porozhdenie novykh znanii na osnove analiza tekstov estestvennogo yazyka // Filosofiya nauki. 2009. № 4. S. 70-90.
  3. Pal'chunov D. E. Reshenie zadach poiska informatsii na osnove ontologii // Biznes-informatika. 2008. № 1. S. 3-13.
  4. Pal'chunov D. E. Teoretiko-model'naya formalizatsiya ontologii i refleksii // Filosofiya nauki. 2006. № 4. S. 86-114.
  5. Pal'chunov D. E., Yakh"yaeva G. E., Khamutskaya A. A. Programmnaya sistema upravleniya informatsionnymi riskami RiskPanel // Programmnaya inzheneriya. 2011. № 7. S. 29-36.
  6. Baader F., Calvanese D., McGuinness D. The Description Logic Handbook. Theory, Implementation, and Applications. Cambridge University Press, 2003.
  7. http://d-russia.ru/ugrozhayushhaya-statistika-rosta-kiberprestupnosti-v-mire.html (data obrashcheniya: 03.09.2013).
  8. http://expolink-company.ru/templates/business_conf.php?show=95 (data obrashcheniya: 01.09.2013).
  9. http://riskwatch.com/ (data obrashcheniya: 23.09.2013).
  10. http://www.cramm.com (data obrashcheniya: 23.09.2013).
  11. http://www.dsec.ru/about/articles/grif_ar_methods/ (data obrashcheniya: 23.09.2013).
  12. http://www.tadviser.ru/index.php/Stat'ya:Kiberprestupnost' (data obrashcheniya: 04.09.2013).
  13. http://17799.denialinfo.com/ (data obrashcheniya: 23.09.2013).
  14. Undercoffer J., Joshi A., Pinkston J. Modeling Computer Attacks: an Ontology for Intrusion Detection. University of Maryland, 2003.

Procedure of Scientific Articles Publication | To Show Issue Content | To Show All Articles in Section | Subject Index

© 2006-2023 GRAMOTA Publishers

site development and search engine optimization (seo): krav.ru