Research on Information Security Risk Assessment Techniques

R. A. Smirnov, S. Novikov
{"title":"Research on Information Security Risk Assessment Techniques","authors":"R. A. Smirnov, S. Novikov","doi":"10.33764/2618-981x-2022-6-250-257","DOIUrl":null,"url":null,"abstract":"The emergence of new technologies not only generates new methods of attacks, but also expands the existing list of threats, and, as you know, each threat can be carried out by a large number of different attacks. To date, there are methods based on various approaches to the study of information security threats, such as: assessment of the relevance of information security threats according to the FSTEC methodology of Russia, ATT&CK Matrix for Enterprise, Howard-Longstaff incident taxonomy, information security threat assessment study based on a security model. All of the above methods can be divided into two groups of threat assessment: quantitative and qualitative. In this connection, there is a need to conduct their research. The article presents a study of methods for assessing information security threats, conducted in various ways.","PeriodicalId":13672,"journal":{"name":"Interexpo GEO-Siberia","volume":"18 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Interexpo GEO-Siberia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33764/2618-981x-2022-6-250-257","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The emergence of new technologies not only generates new methods of attacks, but also expands the existing list of threats, and, as you know, each threat can be carried out by a large number of different attacks. To date, there are methods based on various approaches to the study of information security threats, such as: assessment of the relevance of information security threats according to the FSTEC methodology of Russia, ATT&CK Matrix for Enterprise, Howard-Longstaff incident taxonomy, information security threat assessment study based on a security model. All of the above methods can be divided into two groups of threat assessment: quantitative and qualitative. In this connection, there is a need to conduct their research. The article presents a study of methods for assessing information security threats, conducted in various ways.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
信息安全风险评估技术研究
新技术的出现,不仅产生了新的攻击方法,而且扩大了现有的威胁列表,并且,如您所知,每个威胁都可以通过大量不同的攻击来实施。迄今为止,有基于各种方法的信息安全威胁研究方法,如:根据俄罗斯的FSTEC方法评估信息安全威胁的相关性,企业的ATT&CK矩阵,Howard-Longstaff事件分类法,基于安全模型的信息安全威胁评估研究。以上方法可分为定量和定性两类威胁评估方法。在这方面,有必要进行他们的研究。本文介绍了评估信息安全威胁的方法的研究,以各种方式进行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Обоснование интервала-коллектора в разрезах баженовской свиты в центральной части Мансийской синеклизы (Западная Сибирь) Сравнение современных способов автоматизации процессов цифрового картографирования Typical vibration isolation systems and shock absorbers in on-board electronic equipment designs On one inverse dynamic problem of poroelasticity for a layered medium Siberia in journalism, memoirs and letters of exiled social-democrats
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1