{"title":"确定网络攻击的可能性","authors":"Pavel Yermalovich","doi":"10.26417/ejef.v4i1.p46-63","DOIUrl":null,"url":null,"abstract":"Abstract The use of information is inextricably linked with its security. The presence of vulnerabilities enables a third party to breach the security of information. Threat modeling helps to identify those infrastructures, which would be most likely exposed to cyberattacks. In some cases, however, threat modeling can not be classified as sufficient method of protection. This paper entitled “Determining the probability of cyberattacks” presents an analysis of different techniques with an attempt to identify the most informative parameters and cyberattack prediction markers, which would lay the foundation for the development of cyberattack probability functions. Next, it would be relevant to design such cyberattack probability functions, which would be used upon the initial identification of a cyberattack. The findings of this research could be applied during the future assessment of risk levels of information systems to ensure more effective information security management.","PeriodicalId":202400,"journal":{"name":"European Journal of Formal Sciences and Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Determining the Probability of Cyberattacks\",\"authors\":\"Pavel Yermalovich\",\"doi\":\"10.26417/ejef.v4i1.p46-63\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract The use of information is inextricably linked with its security. The presence of vulnerabilities enables a third party to breach the security of information. Threat modeling helps to identify those infrastructures, which would be most likely exposed to cyberattacks. In some cases, however, threat modeling can not be classified as sufficient method of protection. This paper entitled “Determining the probability of cyberattacks” presents an analysis of different techniques with an attempt to identify the most informative parameters and cyberattack prediction markers, which would lay the foundation for the development of cyberattack probability functions. Next, it would be relevant to design such cyberattack probability functions, which would be used upon the initial identification of a cyberattack. The findings of this research could be applied during the future assessment of risk levels of information systems to ensure more effective information security management.\",\"PeriodicalId\":202400,\"journal\":{\"name\":\"European Journal of Formal Sciences and Engineering\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"European Journal of Formal Sciences and Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.26417/ejef.v4i1.p46-63\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"European Journal of Formal Sciences and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.26417/ejef.v4i1.p46-63","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Abstract The use of information is inextricably linked with its security. The presence of vulnerabilities enables a third party to breach the security of information. Threat modeling helps to identify those infrastructures, which would be most likely exposed to cyberattacks. In some cases, however, threat modeling can not be classified as sufficient method of protection. This paper entitled “Determining the probability of cyberattacks” presents an analysis of different techniques with an attempt to identify the most informative parameters and cyberattack prediction markers, which would lay the foundation for the development of cyberattack probability functions. Next, it would be relevant to design such cyberattack probability functions, which would be used upon the initial identification of a cyberattack. The findings of this research could be applied during the future assessment of risk levels of information systems to ensure more effective information security management.