2021
DOI: 10.17586/2226-1494-2021-21-4-553-561
|View full text |Cite
|
Sign up to set email alerts
|

Risk assessment methodology for information systems, based on the user behavior and IT-security incidents analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
0
0
Order By: Relevance
“…It should be taken into account that the IS of a computer network depends largely on the competent implementation of a number of organizational and design works [4], and a significant problem for modern corporate networks are data leaks [5] - [9], which occur as a result of unauthorized influence of intruders. The proposed methodology of IS risk assessment on the example of an organization's computer network is based on the identification of threats to the security of ES and is aimed at obtaining quantitative results in the assessment of IS risks.…”
Section: Komil Kerimov Et Al Methodology Of Information Security Risk...mentioning
confidence: 99%
“…It should be taken into account that the IS of a computer network depends largely on the competent implementation of a number of organizational and design works [4], and a significant problem for modern corporate networks are data leaks [5] - [9], which occur as a result of unauthorized influence of intruders. The proposed methodology of IS risk assessment on the example of an organization's computer network is based on the identification of threats to the security of ES and is aimed at obtaining quantitative results in the assessment of IS risks.…”
Section: Komil Kerimov Et Al Methodology Of Information Security Risk...mentioning
confidence: 99%