Developed have been the method and the model of evaluation of the information protection level in ASDP, allowing to specify and to increase the quality of evaluations of the current level of protection and including a new model of the information protection, the model of evaluation of the threat effect probability, the algorithms of the protection evaluation. The technology of evaluation of the information protection level, the complex of the software of the method support has been createdAvailable from VNTIC / VNTIC - Scientific & Technical Information Centre of RussiaSIGLERURussian Federatio
In the article, results of the research on the development of methods and models of intellectual rec...
W artykule przedstawiono metodę oceny wpływu zabezpieczeń na funkcjonowanie elementów systemu telein...
In modern conditions of growth of informatization, to ensure the reliability of the functioning of d...
The methodology of the comparative estimation for the quality of protection systems has been develop...
New technologies provide much more progressive ways of working with information. Access to info...
The purpose of the work: the development of the theoretical bases, models and methods of improvement...
Data protection systems in the functioning of the organization in a particular area, highlights the ...
The constuction principles have been developed, and the complex of the protected speed data processi...
We developed the method and the model for managing protection of objects of informatization, based o...
Algorithm to create an end-to-end system of monitoring the security of potential information leakage...
The purpose of this paper is to discuss the information security assessment criteria used in Russia ...
System solutions of actual problems of information security of computer systems is achieved by a com...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
The article is devoted to the method of experimental estimation of parameters of functioning of stan...
In the article, results of the research on the development of methods and models of intellectual rec...
W artykule przedstawiono metodę oceny wpływu zabezpieczeń na funkcjonowanie elementów systemu telein...
In modern conditions of growth of informatization, to ensure the reliability of the functioning of d...
The methodology of the comparative estimation for the quality of protection systems has been develop...
New technologies provide much more progressive ways of working with information. Access to info...
The purpose of the work: the development of the theoretical bases, models and methods of improvement...
Data protection systems in the functioning of the organization in a particular area, highlights the ...
The constuction principles have been developed, and the complex of the protected speed data processi...
We developed the method and the model for managing protection of objects of informatization, based o...
Algorithm to create an end-to-end system of monitoring the security of potential information leakage...
The purpose of this paper is to discuss the information security assessment criteria used in Russia ...
System solutions of actual problems of information security of computer systems is achieved by a com...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
The article is devoted to the method of experimental estimation of parameters of functioning of stan...
In the article, results of the research on the development of methods and models of intellectual rec...
W artykule przedstawiono metodę oceny wpływu zabezpieczeń na funkcjonowanie elementów systemu telein...
In modern conditions of growth of informatization, to ensure the reliability of the functioning of d...