Cybersecurity: Education, Science, Technique最新文献

筛选
英文 中文
INFORMATION WAR: PROBLEMS, THREATS AND ANTIDES 信息战:问题、威胁和对策
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2019.3.8896
Z. Brzhevska, N. Dovzhenko, R. Kyrychok, G. Gaidur, Andriy O. Anosov
{"title":"INFORMATION WAR: PROBLEMS, THREATS AND ANTIDES","authors":"Z. Brzhevska, N. Dovzhenko, R. Kyrychok, G. Gaidur, Andriy O. Anosov","doi":"10.28925/2663-4023.2019.3.8896","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.3.8896","url":null,"abstract":"","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117334123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DEVELOPMENT OF OBJECT MOVEMENT ALGORITHM BY THE NEURAL NETWORK FOR THE CCTV SYSTEM 基于神经网络的闭路电视系统目标移动算法的开发
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2019.6.105111
Vitaliy Petlitsky, Svitlana Shevchenko, N. Mazur
{"title":"DEVELOPMENT OF OBJECT MOVEMENT ALGORITHM BY THE NEURAL NETWORK FOR THE CCTV SYSTEM","authors":"Vitaliy Petlitsky, Svitlana Shevchenko, N. Mazur","doi":"10.28925/2663-4023.2019.6.105111","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.6.105111","url":null,"abstract":"This article addresses the problem of protecting the private property of a protected object, namely: it offers an algorithm for recognizing object movements using a neural network for the CCTV system. The ability of the perception of the outside world in the form of images allows to investigate with certain probability the properties of an infinite number of objects on the basis of acquaintance with their finite number, and the objective nature of the basic property of the images allows to model the process of their recognition. , namely \"image\", \"feature\", \"vector implementation\". The approaches, methods and technologies of object motion recognition are investigated, their qualitative characteristics and disadvantages are highlighted. Artificial neural networks have been found to be the most effective method for solving the object motion recognition task due to result accuracy, simplicity and speed. On the basis of the block diagram of the complex algorithm for image processing and analysis, the algorithm of object motion recognition using neural network for the video surveillance system was developed.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121307453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE DIVIDE AND CONQUER METHOD IN THE DENIABLE ENCRYPTION ALGORITHMS 可否认加密算法中的分而治之法
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.10.2944
A. Halchenko, S. Choporov
{"title":"THE DIVIDE AND CONQUER METHOD IN THE DENIABLE ENCRYPTION ALGORITHMS","authors":"A. Halchenko, S. Choporov","doi":"10.28925/2663-4023.2020.10.2944","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.10.2944","url":null,"abstract":"The deniable encryption algorithms productivity increasing is investigated in this paper. This investigation is relevant because of effective schemes for information and its users protection. But these algorithms is very complex and lumped. It really affects them. That's why deniable encryption algorithms have not been widespread in data processing and information security systems. The execution time reducing methods and tools exploration is the main goal of this work. The divide and conquer method has been discussed and investigated in this paper. It has been implemented into the data processing system of the deniable encryption algorithms. Nothing modifies have been implemented into the base algorithm. It allows to make it universal and apply to other deniable encryption algorithms. The series of experiments have been completed by authors to verify the hypothesis. The base deniable encryption algorithm discussing is the first stage of investigation. Its vulnerabilities have been found and investigated. Another algorithm is based on the divide and conquer method applying. It has been implemented into the modified data processing system. The both algorithms efficiency has been investigated by the experiments with the real with public and secret information files. The experiments have been completed on the prepared equipment. This equipment simulates the user's workplace with real hardware and software. According to the results the deniable encryption algorithms productivity has been reached by the divide and rule method. Also the method has been verified by the different size encryption keys. The base deniable encryption algorithms have not been modified. The results have been compared with other authors' investigations. In the end authors' hypothesis has been proved. But some restrictions of this results reaching have been set by the authors.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122831590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MATHEMATICAL METHODS IN CYBERSECURITY: CATASTROPHE THEORY 网络安全中的数学方法:突变理论
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2023.19.165175
Svitlana Shevchenko, Yuliia Zhdanovа, S. Spasiteleva
{"title":"MATHEMATICAL METHODS IN CYBERSECURITY: CATASTROPHE THEORY","authors":"Svitlana Shevchenko, Yuliia Zhdanovа, S. Spasiteleva","doi":"10.28925/2663-4023.2023.19.165175","DOIUrl":"https://doi.org/10.28925/2663-4023.2023.19.165175","url":null,"abstract":"The improvement of protection systems is based on the introduction and use of a mathematical apparatus. Ensuring the confidentiality, integrity and availability of information is an urgent and important problem in the modern world. Crisis processes are characteristic phenomena in security systems, so stochastic models cannot always describe their functioning and give a solution. An effective tool for solving this problem can be the use of dynamic models based on the provisions of catastrophe theory. This study is devoted to the analysis of modern approaches to the use of the basic provisions of catastrophe theory in cybersecurity systems. The work presents a brief historical view of the development of this theory and highlights the main definitions: bifurcations, attractors, catastrophes. Elementary catastrophes, their forms and features are characterized. A review of the literary sources of the use of catastrophe theory in information and cyber security was carried out. The analysis made it possible to single out that this theory has not yet been widely implemented, but there are point scientific developments in the process of detecting network anomalies in the cloud environment. The considered approaches to the application of catastrophe theory in information and cyber security can be used to train specialists in the specialty 125 Cybersecurity in the process of research","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123392367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WAVELET TRANSFORMATION ATEB-GABOR FILTERS TO BIOMETRIC IMAGES 生物特征图像的小波变换ateb-gabor滤波
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.7.115130
M. Nazarkevych, Yaroslav Voznyi, Sergiy Dmytryk
{"title":"WAVELET TRANSFORMATION ATEB-GABOR FILTERS TO BIOMETRIC IMAGES","authors":"M. Nazarkevych, Yaroslav Voznyi, Sergiy Dmytryk","doi":"10.28925/2663-4023.2020.7.115130","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.7.115130","url":null,"abstract":"Biometric images were pre-processed and filtered in two ways, by wavelet- Gabor and wavelet Ateb-gabor filtration. Ateb-based Gabor filter is effective for filtration because it contains generalizations of trigonometric functions. The wavelet transform of Ateb-Gabor function was developed. The function dependence on seven parameters was shown, each of them significantly changes the filtering results of biometric images. The Ateb-Gabor wavelet research was performed. Graphic dependencies of the wavelet Gabor filter and the wavelet Ateb-Gabor filter were constructed. The appliance of wavelet transform makes it possible to reduce the complexity of calculating an Ateb-Gabor filter by simplifying function calculations and reducing filtering time. The complexities of algorithms for calculating the wavelet Gabor filter and the wavelet Ateb-Gabor filter have been evaluated. Ateb-Gabor filtration allows you to adjust the intensity of the entire image, and to change certain ranges, thereby changing certain areas of the image. Biometric images should have this property, on which the minucius should be contrasting and clear. Ateb functions have the property of changing two rational parameters, which will allow to make more flexible control of filtration. The properties of the Ateb function, as well as the possibility of changing the amplitude of the function, the oscillation frequency by the numerical values of the Ateb-Gabor filter, were investigated. By using the parameters of the Ateb function, you can get a much larger range of shapes and sizes, which expands the number of possible filtration options. You can also perform filtration once, taking into account the direction of the minucius and reliably determine the sharpness of the edges, rather than perform filtration many times. The reliability of results were tested using NIST Special Database 302 and good filtration results were shown. This is confirmed by the comparison experiment between the wavelet-Gabor filter and the wavelet Ateb-Gabor function based on the PSNR signal-to-noise ratio measurement.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124013990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HYBRID CONSTRUCTION OF CYBER SECURITY SYSTEM: ADMINISTRATIVE AND LEGAL PRINCIPLES OF MILITARY-CIVIL COOPERATION 网络安全体系的混合构建:军民合作的行政与法律原则
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2023.19.109121
O. Ponomarov, Serhii Pyvovarchuk, L. Kozubtsova, I. Kozubtsov, T. Bondarenko, T. Tereshchenko
{"title":"HYBRID CONSTRUCTION OF CYBER SECURITY SYSTEM: ADMINISTRATIVE AND LEGAL PRINCIPLES OF MILITARY-CIVIL COOPERATION","authors":"O. Ponomarov, Serhii Pyvovarchuk, L. Kozubtsova, I. Kozubtsov, T. Bondarenko, T. Tereshchenko","doi":"10.28925/2663-4023.2023.19.109121","DOIUrl":"https://doi.org/10.28925/2663-4023.2023.19.109121","url":null,"abstract":"National security of the state is one of the main factors of stable development of society. However, Ukraine and the Armed Forces of Ukraine are forced to counter a hybrid war using cyberspace. It has been established that currently there is no unified vision regarding the methodology of countering wars in a hybrid form. The lack of a countermeasure methodology requires a review of existing approaches to guaranteeing and maintaining state security. The purpose of the article. Justification of the need to create hybrid troops to neutralize cyber threats to the Armed Forces of Ukraine and methods of its implementation on the basis of military-civilian cooperation. Materials and methods. To solve the tasks, a set of theoretical research methods was used: historical analysis and generalization of scientific literature on the research problem; structural and genetic analysis and synthesis when specifying the object and subject of research; the method of going from the abstract to the concrete; the method of analytical and comparative analysis in the analytical and comparative evaluation of the novelty of research results; synthesis and generalization - to justify the methodological and methodical foundations of the research; generalization – formulation of conclusions and recommendations regarding the continuation of further research. Result. A key hypothesis was formed that an effective tool in countering hybrid warfare can be achieved through the use of hybrid troops. Developing this hypothesis substantiates the philosophical idea of the need to create hybrid cyber armies on the basis of military-civilian formations. Foreign experience confirms the high efficiency of military-civilian formations. On the basis of the current legal acts, a method of implementation is proposed. The practical significance of the study lies in the possibility of obtaining advantages in the cyberspace of the Armed Forces of Ukraine during active hybrid wars due to the formation of units of hybrid troops of the Armed Forces of Ukraine.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132537620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHODS TO IMPROVE THE FAULT-TOLERANCE OF INTERNET SERVICES 提高Internet服务容错性的方法
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2019.3.104111
V. Yaskevych, O. Klochko
{"title":"METHODS TO IMPROVE THE FAULT-TOLERANCE OF INTERNET SERVICES","authors":"V. Yaskevych, O. Klochko","doi":"10.28925/2663-4023.2019.3.104111","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.3.104111","url":null,"abstract":". The article deals with the problem of ensuring the fault-tolerance of Internet services. It is becoming increasingly important due to the growth of the quantitative parameters of the functioning of information systems (users, servers, volumes of information in databases) and the level of complexity. Due to the heavy load on the servers on which the applications are deployed, there is a failure of hardware or software. The urgency of finding additional ways to ensure the fault tolerance, reliability and uninterrupted functioning of computer systems operating in real time, due to the increasing requirements for the security of running processes or objects, access to which is limited. Despite the use of existing methods for ensuring fault tolerance in cloud infrastructures, there is a problem of inconsistency between the actual availability of systems and the levels of \"fault tolerance\" (Fault Tolerance) and \"High Availability\" (High Availability) for critical and business critical web applications. Also, less attention is paid to methods of improving fault tolerance for highly loaded systems. Therefore, the search for new opportunities for scaling and load balancing when building cloud systems is of particular importance. To conduct a comparative analysis of load balancing algorithms, functional characteristics were proposed, according to which it is possible to make an informed choice of algorithms that most closely correspond to specific practical circumstances and the requirements of users and providers. The basic principles for implementing a resiliency strategy now include redundancy, diagnostics, reconfiguration, and recovery. As an additional indicator of failover control, it is proposed to apply the completeness of the booking of elements and components of the system, the completeness and reliability of the control, the probability of reserve recovery. The first two strategies assume that a system that correctly performs its functioning algorithm is safe. The safe behavior strategy for failures is used specifically for safe systems and consists in the transition of the system to a protective irreversible state in the event of a failure.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132095520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TOOLS OF IMPROVING THE DIGITAL COMPETENCE LEVEL OF CYBER SECURITY PROFESSIONALS IN THE EDUCATIONAL PROCESS 在教育过程中提高网络安全专业人员数字能力水平的工具
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.15.93109
L. Arsenovych
{"title":"TOOLS OF IMPROVING THE DIGITAL COMPETENCE LEVEL OF CYBER SECURITY PROFESSIONALS IN THE EDUCATIONAL PROCESS","authors":"L. Arsenovych","doi":"10.28925/2663-4023.2022.15.93109","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.93109","url":null,"abstract":"The article analyzes the accrued national and foreign developments regarding the problems of digital competence formation and effective use of information technology in education. The components of digital competence are considered, which provide for a confident, critical and responsible interaction with digital technology for education, work and participation in social activities. The results of a global information security research are presented along with surveys of employees of leading cyber companies around the world, including Ukraine, that testify to the necessity of further application and implementation of an integrated approach to education using organizational measures, software and hardware means and management processes at all activity levels of any organization, as well as using the appropriate tools to raise the digital competence level. The essence of the importance of digital tools in the field of cyber security is formulated, which means a set of Internet tools (resources) to protect network environment entities against various information and cyber threats, ensuring proper organization of countering their effect, formation, functioning and evolution of cyber space and development of educational cyber technology and the information society as a whole. Three main groups of digital cyber security tools were analyzed, identified and proposed (professional cyber tools, education cyber tools and communicative cyber tools) that enable the use, access, filtering, evaluating, creating, programming and communicating digital content, managing and protecting information, content, data and digital identities, as well as working effectively with software, devices, artificial intelligence, robots and more. It is proved that present-day work with digital cyber tools and their content requires a reflective, critical and at the same time inquisitive, open and promising attitude to their development, as well as an ethical, safe, effective and responsible approach to their use","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130862309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALYSIS OF OS WINDOWS 10 FILE OBJECTS FOR SYSTEM PARTITION SPACE CLEANING AND OPTIMIZATION 分析Windows 10操作系统文件对象,用于系统分区空间清理和优化
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.15.7184
Vitalii Bulatetskyi, Lesia Bulatetska, Tetiana Hryshanovych
{"title":"ANALYSIS OF OS WINDOWS 10 FILE OBJECTS FOR SYSTEM PARTITION SPACE CLEANING AND OPTIMIZATION","authors":"Vitalii Bulatetskyi, Lesia Bulatetska, Tetiana Hryshanovych","doi":"10.28925/2663-4023.2022.15.7184","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.7184","url":null,"abstract":"The paper analyzes the causes and ways of solving the problem of free space lack on the system partition during the OS Windows exploitation. The peculiarities of the system partition organization during the installation of common Microsoft operating systems are analyzed. The main system file objects, paths to them, their purpose and role in the use of system partition space and in the functioning of the operating system are considered. Represented the list of paths to the files of the folders that occupy the largest volumes on the system partition. Thees folders correct cleaning or configuring may save a lot of space on the system partition. The main tools of the operating system for the cleaning methods implementation are considered: command line interpretator, PowerShell environment, system registry editing tools, and system library function calling tools. Particular attention is paid to batch files as the simplest and most effective means of implementing automated use of system utilities, taking into account the peculiarities of the command line interpreter. One of the ways to manipulate objects with commands is to use the PowerShell environment. This environment is able not to process commands, but to generate streams of objects related to this command and form their processed representation using both command and graphical interface. Described the logical and physical structure of the registry as one of the tools for managing Windows settings. Was made the comparative analysis of some software products, such as the system console utility for servicing deployment and management images, as well as a number of free software. It has generated the list of functions used for the system partition optimization and cleaning from excessive data. Based on the generated list, the efficiency of using the considered software tools for cleaning the system partition is analyzed.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130633331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DESIGN OF KNOWLEDGE BASE FOR CYBER SECURITY SYSTEMS ON THE BASIS OF SUBJECT IDENTIFICATION METHOD 基于主体识别方法的网络安全系统知识库设计
Cybersecurity: Education, Science, Technique Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.8.135148
V. Lakhno, D. Kasatkin, Maksym Misiura, Borys Husiev
{"title":"DESIGN OF KNOWLEDGE BASE FOR CYBER SECURITY SYSTEMS ON THE BASIS OF SUBJECT IDENTIFICATION METHOD","authors":"V. Lakhno, D. Kasatkin, Maksym Misiura, Borys Husiev","doi":"10.28925/2663-4023.2020.8.135148","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.8.135148","url":null,"abstract":"The article presents the results of research performed in the process of designing an expert system (ES) designed to assess the threats to information security (IS) of critical information facilities (CIF). The approach to designing of expert system on the basis of syllogisms and logic of predicates, and also a method of meaningful identification of objects of knowledge base (KB) is offered. The essence of the method is that each object of the database of the projected EU, is matched by a tuple of keywords (ToK), the significance of which is determined by experts. Thus, each database object is placed in accordance with the element of the finite fuzzy topological space of the database objects. Meaningful identification takes place on the distance between the objects of the database. The approach proposed in the work, in comparison with the decisions of other authors, has a number of advantages. Namely, it allows: to model different variants of cyber threat scenarios for CIF and their consequences; determine the contribution of each of the factors or components of the architecture of the IS CIF to the overall picture of the probability of a cyber threat to the CIF; model the interaction of all IS factors and, if necessary, visualize this interaction; calculate and further rank the values of cyber threat probabilities for CIF for specific threat scenarios; automate the processes of threat modeling through the use of developed software and significantly reduce the time for audit of threats. It is shown that the use of the method of meaningful identification allows to increase the adequacy of the models of the selected subject area, as well as to prevent erroneous introduction of the same judgments of experts and goals in the EU database, in particular by combining hierarchies of goals formed by different expert groups. It is shown that the method can also be used to find the goals of the hierarchy, the exact wording of which, according to keywords, is unknown.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114696407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信