z-logo
open-access-imgOpen Access
THE TECHNIQUE OF SUBSTANTIATING THE RATIONAL COMPOSITION OF INFORMATION SECURITY TOOLS WITH CONSTRAINED RESOURCES
Author(s) -
Iurii I. Sineshchuk,
Tatiana I. Davydova
Publication year - 2021
Publication title -
avtomatizaciâ processov upravleniâ
Language(s) - English
Resource type - Journals
ISSN - 1991-2927
DOI - 10.35752/1991-2927-2021-1-63-13-19
Subject(s) - task (project management) , computer science , information security , computer security model , risk analysis (engineering) , mathematical optimization , computer security , mathematics , business , engineering , systems engineering
Finding the optimal structure of an information security system is an important task complicated by its uncertain, stochastic and nonlinear nature especially, if resources are constrained. The article considers a mathematical model for determining the cost of damage prevented by information security tools, and the cost of their installation and maintenance. The optimization criterion is the minimum cost of the damage prevented. Task variables are the number of different types of security features installed in the security system. The authors propose a methodology to substantiate rational composition of information security tools, taking into account economic constraints.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here