{"title":"评估企业网络安全威胁防护状况的方法","authors":"D. V. Kukshyn","doi":"10.31673/2409-7292.2021.035565","DOIUrl":null,"url":null,"abstract":"Nine methods of enterprise security assessment are considered: vulnerability assessment method, network assessment method, virus detection assessment method, authentication assessment method, penetration test assessment method, social engineering threat assessment method, hardware threat assessment method, policy and countermeasures assessment method and a method for assessing natural hazards.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"13 6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Methods for assessing the state of protection of enterprises from cybersecurity threats\",\"authors\":\"D. V. Kukshyn\",\"doi\":\"10.31673/2409-7292.2021.035565\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nine methods of enterprise security assessment are considered: vulnerability assessment method, network assessment method, virus detection assessment method, authentication assessment method, penetration test assessment method, social engineering threat assessment method, hardware threat assessment method, policy and countermeasures assessment method and a method for assessing natural hazards.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"13 6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2021.035565\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2021.035565","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}