2023
DOI: 10.24425/ijet.2023.146495
|View full text |Cite
|
Sign up to set email alerts
|

Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object

Valerii Lakhno,
Zhuldyz Alimseitova,
Yerbolat Kalaman
et al.

Abstract: A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was proposed to use mathematical modeling at the first stage of the methodology. In particular, a mathematical model was presented based on the use of the apparatus of probability theory to calculate the vulnerability coefficient. This coefficient allows one to assess the level of information security of the OBI network. Criteria for assessing the acceptable… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…In [16], [17], [18], [20], [21], [22], [23] the authors consider the tasks of countering cyber threats in the cloud environment. The focus is on the operational identification of potential vulnerabilities at the levels of access control processes to applied information services of guest operating systems.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [16], [17], [18], [20], [21], [22], [23] the authors consider the tasks of countering cyber threats in the cloud environment. The focus is on the operational identification of potential vulnerabilities at the levels of access control processes to applied information services of guest operating systems.…”
Section: Literature Reviewmentioning
confidence: 99%