Risk analysis is the process of systematically using information to identify and assess risks. This process how to analyze potential information security failure scenarios and the consequences of loss of confidentiality, integrity and preservation Availability of stored information values. Risk assessment is the process of comparing estimated risks against predetermined risk evaluation criteria to determine the level and priority of risk. This operation is performed using the retrieved data Risk analysis results for informed decision making future risk management measures; It is said that this cyber attack could lead to cyber warfare and cyber interference that disrupt national security and sovereignty. All of the above cyber threats are sa...
The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerabil...
The creation of a fuzzy model for the assessment of information security risks using computer mathem...
The paper contains the description of the method of information objects value estimation when analyz...
We suggested some methods for information security risk factors assessment. These methods are based ...
Organizations use different types of information system to reach their goals. Decision makers are re...
The quantification of information security risks is currently highly subjective. Values for informat...
The article presents two approaches to information security risk modeling. The traditional probabili...
Several studies have proposed the concept of "fuzzy logic technique" to assess risk in information s...
Assets are interrelated in risk analysis methodologies for information systems promoted by internati...
Information security risk assessment is an important part of enterprises’ management practices that ...
A method based on improved fuzzy theory of evidence was presented to solve the problem that there ex...
Safety and reliability are essential issues in modern sciences. Modern technical systems should meet...
Analysis of information security risks is an important part in design of information security system...
Operational risk is the risk of losses arising from the failure or inadequate internal processes, hu...
The basis for company IT infrastructure security is information security risks assessment of IT serv...
The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerabil...
The creation of a fuzzy model for the assessment of information security risks using computer mathem...
The paper contains the description of the method of information objects value estimation when analyz...
We suggested some methods for information security risk factors assessment. These methods are based ...
Organizations use different types of information system to reach their goals. Decision makers are re...
The quantification of information security risks is currently highly subjective. Values for informat...
The article presents two approaches to information security risk modeling. The traditional probabili...
Several studies have proposed the concept of "fuzzy logic technique" to assess risk in information s...
Assets are interrelated in risk analysis methodologies for information systems promoted by internati...
Information security risk assessment is an important part of enterprises’ management practices that ...
A method based on improved fuzzy theory of evidence was presented to solve the problem that there ex...
Safety and reliability are essential issues in modern sciences. Modern technical systems should meet...
Analysis of information security risks is an important part in design of information security system...
Operational risk is the risk of losses arising from the failure or inadequate internal processes, hu...
The basis for company IT infrastructure security is information security risks assessment of IT serv...
The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerabil...
The creation of a fuzzy model for the assessment of information security risks using computer mathem...
The paper contains the description of the method of information objects value estimation when analyz...