{"title":"高校电信网络信息安全风险评估","authors":"I. Anikin","doi":"10.1109/DYNAMICS.2016.7818967","DOIUrl":null,"url":null,"abstract":"We use the method based on expert judgments and analytic hierarchy process for information security risks assessment in a typical telecommunication network of the university. We evaluate impacts and possibility values for specific threats at the telecommunication network. We also identify some security vulnerabilities and evaluate them. We use such methods and tools as fuzzy logic, questionnaires, analytic hierarchy process, fuzzy prediction rules for risk factors evaluation.","PeriodicalId":293543,"journal":{"name":"2016 Dynamics of Systems, Mechanisms and Machines (Dynamics)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Information security risks assessment in telecommunication network of the university\",\"authors\":\"I. Anikin\",\"doi\":\"10.1109/DYNAMICS.2016.7818967\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We use the method based on expert judgments and analytic hierarchy process for information security risks assessment in a typical telecommunication network of the university. We evaluate impacts and possibility values for specific threats at the telecommunication network. We also identify some security vulnerabilities and evaluate them. We use such methods and tools as fuzzy logic, questionnaires, analytic hierarchy process, fuzzy prediction rules for risk factors evaluation.\",\"PeriodicalId\":293543,\"journal\":{\"name\":\"2016 Dynamics of Systems, Mechanisms and Machines (Dynamics)\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Dynamics of Systems, Mechanisms and Machines (Dynamics)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DYNAMICS.2016.7818967\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Dynamics of Systems, Mechanisms and Machines (Dynamics)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DYNAMICS.2016.7818967","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information security risks assessment in telecommunication network of the university
We use the method based on expert judgments and analytic hierarchy process for information security risks assessment in a typical telecommunication network of the university. We evaluate impacts and possibility values for specific threats at the telecommunication network. We also identify some security vulnerabilities and evaluate them. We use such methods and tools as fuzzy logic, questionnaires, analytic hierarchy process, fuzzy prediction rules for risk factors evaluation.