Proceedings of the 11th International Conference on “Electronics, Communications and Computing (IC|ECCO-2021)” 2022
DOI: 10.52326/ic-ecco.2021/sec.01
|View full text |Cite
|
Sign up to set email alerts
|

Prioritization of Cybersecurity Measures

Abstract: The considerable losses caused by the low levelof cyber security of companies, institutions and so on and the limited financial resources available imply the need to prioritize the implementation of measures to counter cyber attacks. For this purpose, the respective optimization problem is formulated as a Boolean mathematical programming one. At large dimensions, the use of known methods of solving the problem requires a large volume of calculations. That’s why, a simple rule for approximately solving the prob… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Adults (18+ years old) -ordinary cybersecurity. Knowing the categories of beneficiaries, they are also necessary to: a) identify and systemize the dangers, vulnerabilities and needs regarding the cybersecurity of beneficiaries (by categories); b) define the priorities and stage the measures and actions for cybersecuring the beneficiaries, taking into account the approach [30]; c) systemize the cybersecurity means to be used, taking into account the priorities (b); d) set up the models of cybersecuring the beneficiaries (by categories); e) define the set of criteria characterizing the degree of cybersecurity provided by models (d); f) explore and characterize the system of models (d); g) implement step by step the models (d) in practice, taking into account the results obtained according to items (e) and (f).…”
Section: Organization Of Work To Cybersecuring the Beneficiariesmentioning
confidence: 99%
“…Adults (18+ years old) -ordinary cybersecurity. Knowing the categories of beneficiaries, they are also necessary to: a) identify and systemize the dangers, vulnerabilities and needs regarding the cybersecurity of beneficiaries (by categories); b) define the priorities and stage the measures and actions for cybersecuring the beneficiaries, taking into account the approach [30]; c) systemize the cybersecurity means to be used, taking into account the priorities (b); d) set up the models of cybersecuring the beneficiaries (by categories); e) define the set of criteria characterizing the degree of cybersecurity provided by models (d); f) explore and characterize the system of models (d); g) implement step by step the models (d) in practice, taking into account the results obtained according to items (e) and (f).…”
Section: Organization Of Work To Cybersecuring the Beneficiariesmentioning
confidence: 99%