S. Semenov, V. Davydov, N. Kuchuk, Inna Petrovskaya
{"title":"Software security threat research","authors":"S. Semenov, V. Davydov, N. Kuchuk, Inna Petrovskaya","doi":"10.1109/MMA52675.2021.9610877","DOIUrl":null,"url":null,"abstract":"In the modern world new and modern methods, models and means of software security threats are constantly developing. For timely monitoring of the threat state, a software threat ratio has been developed according to common possible ways of performing application hazard. Developed threat ratio differs from the known ones by minimization the subjectivity of each indicator’s weight coefficients. Comparative studies have been carried out for different types of applications (standalone and web applications). It is shown that standalone software products are exposed to threats and malicious attacks in particular.","PeriodicalId":287017,"journal":{"name":"2021 XXXI International Scientific Symposium Metrology and Metrology Assurance (MMA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 XXXI International Scientific Symposium Metrology and Metrology Assurance (MMA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MMA52675.2021.9610877","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In the modern world new and modern methods, models and means of software security threats are constantly developing. For timely monitoring of the threat state, a software threat ratio has been developed according to common possible ways of performing application hazard. Developed threat ratio differs from the known ones by minimization the subjectivity of each indicator’s weight coefficients. Comparative studies have been carried out for different types of applications (standalone and web applications). It is shown that standalone software products are exposed to threats and malicious attacks in particular.