The paper considers the problem of improving the reliability of estimates of indicators providing information-without danger on the basis of constructing cognitive models related factors are associated with the process of formation and development of various types of information security threats. There are new types of assessments of safety performance to ensure a certain guaranteed level of the range of possible values of the index, which provides a more responsive and more accurate assessment of safety performance. Formed procedure for constructing cognitive models related factors, as well as evaluation of safety performance based on the cognitive model built. This procedure is demonstrated by a specific example. Problem analysis of the l...
One of the mandatory conditions for the successful implementation of any innovative project is to re...
An organization that works with any information must have a security system capable of protecting th...
This article discusses the classification of information security threats according to their level. ...
This article substantiates the relevance of the development of a cognitive model for assessing the s...
In the information security business, 30 years of practical and theoretical research has resulted in...
Organizations should measure their information security performance if they wish to take the right d...
The object of research is the process of assessing the safety of the economic and information intere...
Organizations should measure their information security performance if they wish to take the right d...
The object of research is the process of assessing the safety of the economic and information intere...
In the process of development of the security system of the information system, the risk assessment ...
The paper discusses the modeling of various aspects of the security of critical information infrastr...
Taking into account the criticality of the “human factor,” the probabilistic approach for analysis i...
<div><p>Organizations should measure their information security performance if they wish to take the...
The object of the research is the system of information security of the state. Investigated proble...
Obtaining trustworthy estimates for the reliability and security of corporate information systems is...
One of the mandatory conditions for the successful implementation of any innovative project is to re...
An organization that works with any information must have a security system capable of protecting th...
This article discusses the classification of information security threats according to their level. ...
This article substantiates the relevance of the development of a cognitive model for assessing the s...
In the information security business, 30 years of practical and theoretical research has resulted in...
Organizations should measure their information security performance if they wish to take the right d...
The object of research is the process of assessing the safety of the economic and information intere...
Organizations should measure their information security performance if they wish to take the right d...
The object of research is the process of assessing the safety of the economic and information intere...
In the process of development of the security system of the information system, the risk assessment ...
The paper discusses the modeling of various aspects of the security of critical information infrastr...
Taking into account the criticality of the “human factor,” the probabilistic approach for analysis i...
<div><p>Organizations should measure their information security performance if they wish to take the...
The object of the research is the system of information security of the state. Investigated proble...
Obtaining trustworthy estimates for the reliability and security of corporate information systems is...
One of the mandatory conditions for the successful implementation of any innovative project is to re...
An organization that works with any information must have a security system capable of protecting th...
This article discusses the classification of information security threats according to their level. ...