The tuples formation method for analytic-synthetic tuple model of information security
DOI:
https://doi.org/10.18372/2410-7840.19.11765Keywords:
information security, risk, risk assessment, analytical and synthetic tuple model, analytical cortege, synthetic cortege, risk analysis and assessment tool, risk characteristicsAbstract
One of the main stages of design and construction of information system resources protection is the process of risks assessment. To implement it, there is a wide range of risk analysis and assessment (RAA) tools. For their suitable choice it has been carried out a research of the corresponding tools with the objective to determine the set of necessary comparative characteristics. According to the specified means, taking into account the known analytical-synthetic tuple model of risk characteristics, the necessary tuple is being formed. It provides the way concerning the certain parameters not only to unify the process of the comparative analysis of RAA tools, but also to approach to their development. Each tuple is formed according to certain principles. The analytical tuple is formed according to the results of the analysis of existing analysis tools and risk assessment, synthetic – is formed based on experts' priorities regarding risk characteristics, which, in their opinion, should be used in the risk assessment system which is in the process of development. This would enhance the efficiency of decision making when choosing the necessary RAA tool.
References
А. Корченко, С. Казмирчук, Ю. Дрейс, А. Гололобов, "Бистабильная интегрированная кортежная модель характеристик риска", Захист інформації, Т. 18, №4, С. 314-323, 2016.
Ф. Приставка, П. Павленко, С. Казмирчук, М. Коломиец, "Исследование средств оценивания рисков безопасности ресурсов информационных систем", Захист інформації, №1, С. 47-56, 2017.
А. Корченко, А. Архипов, С. Казмирчук, Анализ и оценивание рисков информационной безопасности, Монография. Киев: ООО ‘Лазурит-Полиграф’, 2013, 275 c.
А. Корченко, Построение систем защиты информации на нечетких множествах. Теория и практические решения, Киев: «МК-Пресс», 2006, 320 c.
Д. Горніцька, В. Волянська, А. Корченко "Визначення коефіцієнтів важливості для експертного оцінювання у галузі інформаційної безпеки", Захист інформації, №1, С. 108-121, 2012.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).