z-logo
open-access-imgOpen Access
Methods for assessing the state of protection of enterprises from cybersecurity threats
Author(s) -
D. V. Kukshyn,
AUTHOR_ID
Publication year - 2021
Publication title -
sučasnij zahist ìnformacìï
Language(s) - English
Resource type - Journals
ISSN - 2409-7292
DOI - 10.31673/2409-7292.2021.035565
Subject(s) - vulnerability assessment , computer security , threat assessment , computer science , vulnerability (computing) , risk assessment , risk analysis (engineering) , impact assessment , business , political science , psychology , public administration , psychological resilience , psychotherapist
Nine methods of enterprise security assessment are considered: vulnerability assessment method, network assessment method, virus detection assessment method, authentication assessment method, penetration test assessment method, social engineering threat assessment method, hardware threat assessment method, policy and countermeasures assessment method and a method for assessing natural hazards.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here