V. Selifanov, P. Zvyagintseva, Elena A. Plahotnikova
{"title":"检查信息系统的信息安全威胁模型","authors":"V. Selifanov, P. Zvyagintseva, Elena A. Plahotnikova","doi":"10.17212/2782-2230-2023-2-52-70","DOIUrl":null,"url":null,"abstract":"The basis of the work is the development of an automated software tool for the examination of information security threat models developed for various information systems that process data for compliance with the requirements of regulatory legal acts and regulatory methodological documentation initiated by the Decree of the Government, the FSS and the FSTEC of Russia.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Examination of the information security threats model for information systems\",\"authors\":\"V. Selifanov, P. Zvyagintseva, Elena A. Plahotnikova\",\"doi\":\"10.17212/2782-2230-2023-2-52-70\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The basis of the work is the development of an automated software tool for the examination of information security threat models developed for various information systems that process data for compliance with the requirements of regulatory legal acts and regulatory methodological documentation initiated by the Decree of the Government, the FSS and the FSTEC of Russia.\",\"PeriodicalId\":207311,\"journal\":{\"name\":\"Digital Technology Security\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Digital Technology Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17212/2782-2230-2023-2-52-70\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Technology Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17212/2782-2230-2023-2-52-70","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Examination of the information security threats model for information systems
The basis of the work is the development of an automated software tool for the examination of information security threat models developed for various information systems that process data for compliance with the requirements of regulatory legal acts and regulatory methodological documentation initiated by the Decree of the Government, the FSS and the FSTEC of Russia.