{"title":"信息安全专家系统决策算法研究","authors":"Natalya Kireeva, I. Pozdnyak, N. Filippov","doi":"10.1109/PICST51311.2020.9467899","DOIUrl":null,"url":null,"abstract":"In today’s world, expert systems are used to solve various problems, including auditing the information security of an automated system. The article proposes one of the options for the decision-making algorithm of an expert system with the aim of assessing information security, which allows you to effectively counter modern cyber threats aimed at critical information objects of industrial systems and digital industries. Each step of the presented algorithm is described in detail, a methodology for assessing risks for the enterprise based on the results of its work is given. In addition, the paper presents the peculiar properties of the results of a comprehensive assessment of information security.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Development of a Decision-Making Algorithm for Expert System in Information Security\",\"authors\":\"Natalya Kireeva, I. Pozdnyak, N. Filippov\",\"doi\":\"10.1109/PICST51311.2020.9467899\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today’s world, expert systems are used to solve various problems, including auditing the information security of an automated system. The article proposes one of the options for the decision-making algorithm of an expert system with the aim of assessing information security, which allows you to effectively counter modern cyber threats aimed at critical information objects of industrial systems and digital industries. Each step of the presented algorithm is described in detail, a methodology for assessing risks for the enterprise based on the results of its work is given. In addition, the paper presents the peculiar properties of the results of a comprehensive assessment of information security.\",\"PeriodicalId\":123008,\"journal\":{\"name\":\"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PICST51311.2020.9467899\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICST51311.2020.9467899","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Development of a Decision-Making Algorithm for Expert System in Information Security
In today’s world, expert systems are used to solve various problems, including auditing the information security of an automated system. The article proposes one of the options for the decision-making algorithm of an expert system with the aim of assessing information security, which allows you to effectively counter modern cyber threats aimed at critical information objects of industrial systems and digital industries. Each step of the presented algorithm is described in detail, a methodology for assessing risks for the enterprise based on the results of its work is given. In addition, the paper presents the peculiar properties of the results of a comprehensive assessment of information security.