2019
DOI: 10.36994/2707-4110-2019-2-23-27
|View full text |Cite
|
Sign up to set email alerts
|

Irisk Method for Security Estimation of the Simulation Polygon for the Protection of Critical Information Resources

Abstract: In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 0 publications
0
2
0
1
Order By: Relevance
“…As an alternative may be used approach, which involves the development of models and modeling (simulation work -simulation) of computing system behavior. The modeling is a fundamental method for studying the behavior of complex systems [2][3][4][5].…”
Section: Modelingmentioning
confidence: 99%
See 1 more Smart Citation
“…As an alternative may be used approach, which involves the development of models and modeling (simulation work -simulation) of computing system behavior. The modeling is a fundamental method for studying the behavior of complex systems [2][3][4][5].…”
Section: Modelingmentioning
confidence: 99%
“…It was offered to use simulation modeling for determination the actual security threats [9][10][11][12]. GNS3 Cisco Systems software have been selected as the simulation environment (Fig 1).…”
Section: Simulation Environmentmentioning
confidence: 99%
“…Компонент Internet відіграє роль зловмисника, атакуючого корпоративну мережу (рис. 1).Функції даного елементу системи захисту зрозумілі, генерація загроз та спроби надсилання загроз на endpoint корпоративної мережі[16][17][18].…”
unclassified