{"title":"Development of a Decision-Making Algorithm for Expert System in Information Security","authors":"Natalya Kireeva, I. Pozdnyak, N. Filippov","doi":"10.1109/PICST51311.2020.9467899","DOIUrl":null,"url":null,"abstract":"In today’s world, expert systems are used to solve various problems, including auditing the information security of an automated system. The article proposes one of the options for the decision-making algorithm of an expert system with the aim of assessing information security, which allows you to effectively counter modern cyber threats aimed at critical information objects of industrial systems and digital industries. Each step of the presented algorithm is described in detail, a methodology for assessing risks for the enterprise based on the results of its work is given. In addition, the paper presents the peculiar properties of the results of a comprehensive assessment of information security.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICST51311.2020.9467899","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In today’s world, expert systems are used to solve various problems, including auditing the information security of an automated system. The article proposes one of the options for the decision-making algorithm of an expert system with the aim of assessing information security, which allows you to effectively counter modern cyber threats aimed at critical information objects of industrial systems and digital industries. Each step of the presented algorithm is described in detail, a methodology for assessing risks for the enterprise based on the results of its work is given. In addition, the paper presents the peculiar properties of the results of a comprehensive assessment of information security.