{"title":"收集有关计算机网络的正确和一致的信息的问题","authors":"A. Chechulin","doi":"10.34219/2078-8320-2023-14-1-91-94","DOIUrl":null,"url":null,"abstract":"Computer network security evaluation is an important process that helps organizations to identify and mitigate potential vulnerabilities and threats in their infrastructure. The success of this process depends on the correctness and consistency of the information collected for the evaluation. However, collecting correct and consistent information to evaluate the security of a computer network can be a difficult task due to various factors. This article presents an analysis of the main issues that arise when collecting information for security assessment and their possible solutions.","PeriodicalId":299496,"journal":{"name":"Informatization and communication","volume":"98 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"The issues of collecting correct and consistent information about a computer network\",\"authors\":\"A. Chechulin\",\"doi\":\"10.34219/2078-8320-2023-14-1-91-94\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computer network security evaluation is an important process that helps organizations to identify and mitigate potential vulnerabilities and threats in their infrastructure. The success of this process depends on the correctness and consistency of the information collected for the evaluation. However, collecting correct and consistent information to evaluate the security of a computer network can be a difficult task due to various factors. This article presents an analysis of the main issues that arise when collecting information for security assessment and their possible solutions.\",\"PeriodicalId\":299496,\"journal\":{\"name\":\"Informatization and communication\",\"volume\":\"98 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Informatization and communication\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.34219/2078-8320-2023-14-1-91-94\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Informatization and communication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.34219/2078-8320-2023-14-1-91-94","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The issues of collecting correct and consistent information about a computer network
Computer network security evaluation is an important process that helps organizations to identify and mitigate potential vulnerabilities and threats in their infrastructure. The success of this process depends on the correctness and consistency of the information collected for the evaluation. However, collecting correct and consistent information to evaluate the security of a computer network can be a difficult task due to various factors. This article presents an analysis of the main issues that arise when collecting information for security assessment and their possible solutions.