Research on Information Security Risk Assessment Techniques

R. A. Smirnov, S. Novikov
{"title":"Research on Information Security Risk Assessment Techniques","authors":"R. A. Smirnov, S. Novikov","doi":"10.33764/2618-981x-2022-6-250-257","DOIUrl":null,"url":null,"abstract":"The emergence of new technologies not only generates new methods of attacks, but also expands the existing list of threats, and, as you know, each threat can be carried out by a large number of different attacks. To date, there are methods based on various approaches to the study of information security threats, such as: assessment of the relevance of information security threats according to the FSTEC methodology of Russia, ATT&CK Matrix for Enterprise, Howard-Longstaff incident taxonomy, information security threat assessment study based on a security model. All of the above methods can be divided into two groups of threat assessment: quantitative and qualitative. In this connection, there is a need to conduct their research. The article presents a study of methods for assessing information security threats, conducted in various ways.","PeriodicalId":13672,"journal":{"name":"Interexpo GEO-Siberia","volume":"18 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Interexpo GEO-Siberia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33764/2618-981x-2022-6-250-257","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The emergence of new technologies not only generates new methods of attacks, but also expands the existing list of threats, and, as you know, each threat can be carried out by a large number of different attacks. To date, there are methods based on various approaches to the study of information security threats, such as: assessment of the relevance of information security threats according to the FSTEC methodology of Russia, ATT&CK Matrix for Enterprise, Howard-Longstaff incident taxonomy, information security threat assessment study based on a security model. All of the above methods can be divided into two groups of threat assessment: quantitative and qualitative. In this connection, there is a need to conduct their research. The article presents a study of methods for assessing information security threats, conducted in various ways.
信息安全风险评估技术研究
新技术的出现,不仅产生了新的攻击方法,而且扩大了现有的威胁列表,并且,如您所知,每个威胁都可以通过大量不同的攻击来实施。迄今为止,有基于各种方法的信息安全威胁研究方法,如:根据俄罗斯的FSTEC方法评估信息安全威胁的相关性,企业的ATT&CK矩阵,Howard-Longstaff事件分类法,基于安全模型的信息安全威胁评估研究。以上方法可分为定量和定性两类威胁评估方法。在这方面,有必要进行他们的研究。本文介绍了评估信息安全威胁的方法的研究,以各种方式进行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信