МОДЕЛЬ ОЦЕНКИ ЭФФЕКТИВНОСТИ СИСТЕМ ЗАЩИТЫ ИНФОРМАЦИИ
Аннотация
Ключевые слова
Полный текст:
PDFЛитература
1. Aman W., Shukaili J. A Classification of Essential Factors for the Development and Implementation of Cyber Security Strategy in Public Sector Organizations. International Journal of Advanced Computer Science and Applications. 2021.
DOI: 10.14569/ijacsa.2021.0120820.
2. Tam T., Rao A., Hall J. The Good, The Bad and The Missing: A Narrative Review of Cyber-security Implications for Australian Small Businesses. Computers & Security. 2021, v. 109, p. 102385.
DOI: 10.1016/j.cose.2021.102385.
3. Kankanhalli A., Teo H., Tan B., Wei K. An Integrative Study of Information Systems Security Effectiveness. International Journal of Information Management. 2003, v. 23, p. 139–154.
DOI: 10.1016/S0268-4012(02)00105-6.
4. Chang S., Ho C. Organizational Factors to the Effectiveness of Implementing Information Security Management. Industrial Management & Data Systems. 2006, v. 106, no. 3, p. 345–361.
DOI: 10.1108/02635570610653498.
5. Alassaf M., Alkhalifah A. Exploring the Influence of Direct and Indirect Factors on Information Security Policy Compliance: A Systematic Literature Review. IEEE Access. 2021, v. 9, p. 162687–162705. DOI: 10.1109/ACCESS.2021.3132574.
6. Panchenko V. System Characteristics, Factors and Threats to the Economic Security of Enterprises. Business Inform. 2023.
DOI: 10.32983/2222-4459-2023-9-162-167.
7. Bayewu A., Patcharaporn Y., Folorunsho O., Ojo T. An In-depth Review of Cybersecurity Controls in Mitigating Legal and Risk-Related Challenges. Advances in Multidisciplinary and Scientific Research Journal Publication. 2022. DOI: 10.22624/aims/sij/v8n4p1.
8. Мельников Д.А., Мельников А.Д. Национальная система доверия на основе инфраструктуры открытых ключей для цифровой экономики Российской Федерации. М.: Горячая линия – Телеком, 2023. – 384 с.
9. Litvinchuk I., Korshun N., Vorokhob M. Method of Evaluation of Integrated Security Systems at the Object of Information Activity. Cybersecurity. 2020, v. 2, p. 135–143.
DOI: 10.28925/2663-4023.2020.10.135143.
10. Ziro A., Gnatyuk S., Toibayeva S. Investigation of the Method of Evaluating the Effectiveness of the Information Security System Based on Fuzzy Inference. Scientific Journal of Astana IT University. 2023. DOI: 10.37943/13dzev3953.
11. Belov V., Belova N., Pestunova T., Kosov D. Technique for Evaluating the Effectiveness of the Information Security Department. IEEE XVI International Scientific and Technical Conference Actual Problems of Electronic Instrument Engineering (APEIE). 2023, p. 1130–1133.
DOI: 10.1109/APEIE59731.2023.10347645.
12. Кулик Сергей Д. Применение системного анализа для оценки эффективности средств обеспечения информационной безопасности. Безопасность информационных технологий, [S.l.], т. 26, № 1, с. 25–35, 2019. ISSN 2074-7136.
DOI: http://dx.doi.org/10.26583/bit.2019.1.03. – EDN: YZELKX.
13. Pattinson M. A Method of Assessing Information System Security Controls. In: Proceedings of the International Conference on Information Security. 2008, p. 2059–2074. DOI: 10.4018/978-1-59904-937-3.CH138.
14. Максимова Е.А. Когнитивное моделирование деструктивных злоумышленных воздействий на объектах критической информационной инфраструктуры. Труды учебных заведений связи. 2020, т. 6, № 4,
с. 91–103. DOI:10.31854/1813-324X-2020-6-4-91-103.
15. Baranov V., Maksimova E., Aliev E. Decision support models in the development of systems for the protection of informatization objects. AIP Conference Proceedings. V. 2700, 070016 (2023).
DOI: https://doi.org/10.1063/5.0125661.
DOI: http://dx.doi.org/10.26583/bit.2024.4.03
Ссылки
- На текущий момент ссылки отсутствуют.
Это произведение доступно по лицензии Creative Commons «Attribution» («Атрибуция») 4.0 Всемирная.