Diophantus method of determining of freguency damages as a result of implementations information security threat
DOI:
https://doi.org/10.18372/2410-7840.15.5707Keywords:
diophantus method, frequency of damage, information security threat, government information resource, risk evaluation.Abstract
Implementation of information security management systems based on risk assessments is a promising approach of ensuring the confidentiality, integrity and availability of state information resources. Risk assessment is expressed as a combination of frequency of damage occurrence as a result of the threat and its absolute value. Therefore the choice of the method for determining of its assessment leads to the choice of the method of determining the frequency of damage occurrence. Using traditional approaches to solving this problem is limited to the complexity of the statistics accumulation of damage. To overcome this limitation developed a method of determining the relative frequency of a linear inhomogeneous Diophantine equation in positive integers. It allows through adjusting acceptable values the amount of damage and acceptable risk values to get guaranteed solutions as model risk assessments. Making a decision on the necessity of their treatment in the management of information systems security is possible basing on received results.
References
Безштанько В. М. Определение приемлемого значения риска для информационных активов организации / В. М. Безштанько // Збірник наукових праць ІПМЕ ім. Г.Є. Пухова НАН України. — 2013
Безштанько В. М. Анализ условий разрешимости неоднородного положительного диофантового уравнения при моделировании рисков безопасности информации / В. М. Безштанько // Моделю¬вання та інформаційні технології. — К.: ІПМЕ ім. Г.Є. Пухова НАН України, 2012. — Вип. 66. — С. 92 — 96.
Безштанько В. М. Анализ методов решения неоднородных положительных диофантовых уравнений в контексте моделирования рисков /В. М. Безштанько// Информационные технологии и безопасность. — 2012. — Вип. 2. — С. 96 — 106.
Вишняков Я. Д. Общая теория рисков: учеб.пособие для студ. высш. учеб. заведений / Я. Д. Вишняков,
Н. Н. Радаев. — М.: Издательский центр «Академия», 2007. - 368 с.
Качинський А. Б. Безпека загрози і ризик: наукові концепції та математичні моделі / А. Б. Качинський. - К., 2003. - 472.
Колесников П. С. Теория чисел [Электронный ресурс] / П. С. Колесников. - Режим доступа: http:/ /math.nsc.ru/LBRT/а1/pavelsk/Num_Theory.p df. — Дата доступа: июнь 2013. — Название с экрана.
Методи захисту в банківській діяльності. Система управління інформаційною безпекою. Вимоги: (ISO/IEC 27001:2005, МОD): СОУ Н НБУ 65.1 СУІБ 1.0:2010 - Чинний з 2010-10-28. - К.: Національний банк України, 2010. - 59 с. - (Стандарт організації України).
Методи захисту в банківській діяльності. Звід правил для управління інформаційною безпекою: (ISO/IEC 27002:2005, МОD): СОУ Н НБУ 65.1 СУІБ 2.0:2010 - Чинний з 2010-10-28. - К. : Націо¬нальний банк України, 2010. - 195 с. - (Стандарт організації України).
Методы и средства обеспечения безопасности. Менеджмент риска информационной безопасности [Электронный ресурс]: (ISO/IEC 27005:2008, IDT): ГОСТ Р ИСО/МЭК 27005-2010 - Действующий с 2010-11-30. - М.: Стандартинформ, 2011. - Режим доступа: http://docs.cntd.ru/document/ 1200084141. - Дата доступа: май. 2013. - Название с экрана.
Мохор В. В. Построение оценок рисков безопасности информации на основе динамического множества актуальных угроз / В. В. Мохор, А. М. Богданов, О. Н. Крук, В. В. Цуркан / / Збірник наукових праць Інституту проблем моделювання в енергетиці ім. Г. Є. Пухова. - К.: ІПМЕ ім. Г. Є. Пухова НАН України, 2010. - Вип. 56. -
С. 87-99.
Bezshtanko V.M Determining an acceptable level of risk for the organization's information assets / V. M. Bezshtanko / / Collection of Scientific Papers of Pukhov Institute for Modeling in Energy Engineering, National Academy of Sciences of Ukraine, K: Pukhov Institute for Modeling in Energy Engineering, National Academy of Sciences of Ukraine, 2013 ( in printing)
Bezshtanko V. M. Analysis of the conditions of the solvability of the positive inhomogeneous diophantine equation for modeling information security risks / V. M. Bezshtanko // Simulations and IT, K: Pukhov Institute for Modeling in Energy Engineering, National Academy of Sciences of Ukraine, 2012, Issue 66, P. 92 - 96.
Bezshtanko V. M. Analysis of the methods of solutions of inhomogeneous positive diophantine equations in the context of risk modeling / V. M Bezshtanko/ Information technology and security., 2012, Issue 2, P. 96 - 106.
Vishnjakov Y. General theory of risks : manual for the students at higher education institutions / Y. D. Vishnyakov, N.N. Radaev., M.: Publishing Center "The Academy", 2007., 368 p.
Kachynskiy A. B. Security of threats and risk: scientific concepts and mathematical models /
A. B. Kachynskiy., K, 2003, 472 p.
Kolesnikov P. S. Number Theory [electronic resource] / P. S Kolesnikov., Access mode: http:// math.nsc.ru/LBRT/a1/pavelsk/Num_Theory.pdf. Date of access: June 2013., The screen title.
Methods of protection in banking. Information Security Management System. Requirements: (ISO / IEC 27002:2005, MOD): N Bank JMA 65.1 ISMS 2.0:2010, Valid from 2010-10-28., Kyiv: National Bank of Ukraine, 2010., 195 p. (Organization standard of Ukraine).
Methods of protection in banking. Code of Rules for Information Security Management: (ISO / IEC 27002:2005, MOD): N Bank JMA 65.1 ISMS 2.0:2010., Valid from 2010-10-28., Kyiv: National Bank of Ukraine, 2010., 195 p. (Organization standard of Ukraine).
The methods and means to ensure security. Information security risk management [electronic resource]: (ISO / IEC 27005:2008, IDT): GOST R ISO / IEC 27005-2010., Valid from 2010-11-30. Moscow: Standartinform, 2011., Access mode : http://docs.cntd.ru/document/1200084141, Date of access: May 2013., The screen title.
Mokhor V. Building a risk assessment of information security based on a dynamic set of actual threats / V. Mokhor, A. Bogdanov, O. Cruk, V. Tsurkan// Collection of Scientific Papers of Pukhov Institute for Modeling in Energetics, National Academy of Sciences of Ukraine., K: Pukhov Institute for Modeling in Energy Engineering, National Academy of Sciences of Ukraine, 2010, Issue. 56, P. 87 - 99.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).