Efficiency coefficient calculation for technical information security based on its parameters
DOI:
https://doi.org/10.18372/2225-5036.21.9687Keywords:
coefficient for technical information security, technical information security, given the likelihood of a security breach highs, breaking attempt, time for breaking attempt, complex of technical information securityAbstract
This paper shows ways to determine the efficiency coefficient for technical information security in the design stage and analysis of the functioning of technical security. The complexity of the determination of efficiency coefficient for technical information security is the lack of all necessary initial parameters. Therefore, we considered three main options. First, when we know the financial costs invested in the protection and time of the attempt to hacking attempts. The second option – it is when we know the financial costs of the defense and the possibility of breaking the technical security on the first try, which is known for. The probability of breaking proofing for the initial conditions can be calculated using various other existing methods and methods for assessing the quality of technical information security. The third option – the most common, where known, any two attempts, time of break-in attempts and the likelihood of hacking attempts. As a result of research we obtained formulas that allow for these known parameters to build a surface highs probability of breaking technical information security, which can determine the parameters of a possible burglary technical information security for all processes of breaking.References
Журиленко Б.Е. Математическая модель вероятностной надежности комплекса технической защиты информации / Б.Е. Журиленко // Безпека інформації. – 2012. №2 (18). – С. 61-65.
Журиленко Б.Е. Метод проектирования единичной системы технической защиты инфор-мации с вероятностной надежностью и заданными параметрами взлома / Б.Е. Журиленко // Безпека інформації.– 2014. – №1 (20). – С. 36-42.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.