z-logo
open-access-imgOpen Access
CONDUCTING A SWOT-ANALYSIS OF INFORMATION RISK ASSESSMENT AS A MEANS OF FORMATION OF PRACTICAL SKILLS OF STUDENTS SPECIALTY 125 CYBER SECURITY
Author(s) -
Світлана Шевченко,
Yuliia Zhdanovа,
Svitlana Spasiteleva,
Pavlo Skladannyi
Publication year - 2020
Publication title -
kìberbezpeka. osvìta, nauka, tehnìka
Language(s) - English
Resource type - Journals
ISSN - 2663-4023
DOI - 10.28925/2663-4023.2020.10.158168
Subject(s) - swot analysis , information security , knowledge management , process (computing) , confidentiality , computer science , quality (philosophy) , relevance (law) , risk analysis (engineering) , process management , business , computer security , marketing , philosophy , epistemology , political science , law , operating system
This article examines the problem of implementing active teaching methods for students majoring in 125 Cybersecurity. The study of qualitative analysis of information security risks (IS) is presented on the example of studying the discipline "Risk Theory", namely the use of SWOT-analysis tools for risk assessment in the field of IS of small and medium business. General relevance and possibilities of using SWOT-analysis in the field of IS risk to study the internal environment of the organization, its strengths and weaknesses with the definition of enterprise strategies in the external environment: confronting threats to secure information (confidentiality, availability and integrity), and other its development. Based on scientific sources, the main research of the definition is analyzed: IS risks, risk analysis and their quality assessment. The content and procedure of SWOT-analysis are described. Using forms of group work and active methods (trainings) in the educational process, the basic factors for SWOT-analysis of the virtual organization "Internet Provider" were created, methodical expert assessments were conducted to identify the primary features of these factors, the analysis of the results was obtained.It is proved that the introduction of this technology in the educational process promotes the development of theoretical knowledge and the formation and development of practical skills of future specialists in information and cyber security

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here