Логотип репозиторію
  • English
  • Yкраї́нська
  • Увійти
    Новий користувач? Зареєструйтесь.Забули пароль?
Логотип репозиторію
  • Фонди та зібрання
  • Пошук за критеріями
Користувачам
  • Положення
  • Авторський договір
  • Форма для зовнішніх авторів
  • Авторська етика
  • Глосарій
  • English
  • Yкраї́нська
  • Увійти
    Новий користувач? Зареєструйтесь.Забули пароль?
  1. Головна
  2. Переглянути за автором

Перегляд за Автор "Romashchenko, N."

Зараз показуємо 1 - 1 з 1
Результатів на сторінці
Налаштування сортування
  • Документ
    The algorithm of information security risk assessment based on fuzzy-multiple approach
    (2020) Romashchenko, N.
    The subject of the study is the process of assessing the level of information security risk that is being implemented with the help of the fuzzy logic apparatus. The purpose of this work is to develop a methodology for assessing the degree of information security risk, which would avoid the uncertainty factor, that occurs when some parts of information about the analyzed automated information system are absent. The methodology is based on the use of fuzzy logic and fuzzy sets. Which implies the introduction of the term sets for each of the system characteristics and the linguistic assessment of the indicators. The tasks to be solved are to analyze existing information security risk assessment methodologies for identifying their strengths and weaknesses. On the basis of the conducted analysis, a new method for assessing the risk of automated information systems information security is proposed. The following results were obtained: the advantages and disadvantages of qualitative and quantitative methodologies for assessing the risk degree of automated systems information security were identified; the main stages of the proposed methodology were described. Conclusion: The methodology presented in the article provides an opportunity to translate the obtained results of risk assessment from a mathematical language into a linguistic form that is more comprehensible to the decision-maker. This increases the effectiveness of the management of automated information systems protection mechanisms.

DSpace software copyright © 2002-2026 LYRASIS

  • Налаштування куків
  • Угода користувача
  • Зворотний зв’язок