z-logo
open-access-imgOpen Access
Formalized Risk-Oriented Model of the Information Technology System
Author(s) -
Roman Anosov,
Sergey Anosov,
Igor Shakhalov
Publication year - 2020
Publication title -
voprosy kiberbezopasnosti
Language(s) - English
Resource type - Journals
ISSN - 2311-3456
DOI - 10.21681/2311-3456-2020-05-69-76
Subject(s) - computer science , set (abstract data type) , relation (database) , generalization , information technology , risk analysis (engineering) , information system , point (geometry) , information security , control (management) , computer security , data mining , engineering , business , mathematics , artificial intelligence , mathematical analysis , geometry , electrical engineering , programming language , operating system
. The aim of the study is to systematize the principles of building information technologies that are essential from the point of view of information risk assessment, and to form, on this basis, a model that provides the ability to analyze risk factors when building secure information systems. Methods: when developing the model, the methods of game theory and set theory were used. The result: the model is focused on taking into account the conflicting nature of interaction between information technologies and sources of threats to information security The information technology system is considered as an interconnected set of technologies of the warring parties, providing the processes of practical activity of one of them, which allows, on a unified methodological basis, to analyze the vulnerabilities of information technologies, scenarios for the implementation of threats, as well as to optimize technological solutions for information protection. The model is characterized by a high degree of generalization, since its main elements are abstract entities: a set of information technologies used by the parties; sets of information operations, implemented by technologies; information and control relationships on sets of technologies and operations. To use the model requires a preliminary development of the list and characteristics of these sets and relations in relation to specific information technologies

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here