
Improving the stochastic model to identify threats of damage or unauthorized leakage
Author(s) -
O. R. Stefurak,
Yu. O. Tykhonov,
O. A. Laptyev,
S. A. Zozulya
Publication year - 2020
Publication title -
sučasnij zahist ìnformacìï
Language(s) - English
Resource type - Journals
ISSN - 2409-7292
DOI - 10.31673/2409-7292.2020.021926
Subject(s) - computer security , information leakage , information security management , information security , computer science , leakage (economics) , plan (archaeology) , risk analysis (engineering) , security information and event management , information sensitivity , cloud computing security , business , cloud computing , archaeology , economics , macroeconomics , operating system , history
The key role in building security systems of information resources as components of national information resources of the state is played by theory and practice, in which the scientific and methodological base is the basis for making sound and effective management decisions by information security of the state at all levels. The article identifies critical components of information space security based on an analytical analysis of threats of damage or unauthorized leakage of information at the objects of information activity. Based on the obtained analytical data, the stochastic model of threats of damage or unauthorized leakage of information at the objects of information activity has been improved. Based on the results of the proposed model, modeling was performed in order to confirm the analytical data and identified priorities for information security. The most critical areas and threats to information security are identified. The obtained results allow to plan the information security system taking into account the most probable threats. Plan and implement priority information security measures. Focus on protecting more likely areas of threat.