{"title":"Risk assessment in the process of determining the system architecture","authors":"Veronika V. Anikeeva, V. Selifanov","doi":"10.17212/2782-2230-2022-4-52-62","DOIUrl":null,"url":null,"abstract":"Organizations use the process of defining the architecture as part of the creation (modernization, development) and operation of the system to ensure its safety, quality and efficiency. The architecture reflects the principles guiding the design of the system, takes into account the risks, requirements and limitations for their implementation. The article discusses the procedure for conducting a risk assessment in the process of determining the system architecture, and also suggests probabilistic methods for solving problems of assessing possible risks arising in the process of determining the system architecture, taking into account information security requirements.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"729 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Technology Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17212/2782-2230-2022-4-52-62","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Organizations use the process of defining the architecture as part of the creation (modernization, development) and operation of the system to ensure its safety, quality and efficiency. The architecture reflects the principles guiding the design of the system, takes into account the risks, requirements and limitations for their implementation. The article discusses the procedure for conducting a risk assessment in the process of determining the system architecture, and also suggests probabilistic methods for solving problems of assessing possible risks arising in the process of determining the system architecture, taking into account information security requirements.