{"title":"基于专家方法识别当前威胁的模型和算法","authors":"","doi":"10.18469/ikt.2023.21.3.05","DOIUrl":null,"url":null,"abstract":"The task of identifying current security threats is becoming increasingly important, due to the increase in the volume of processed information of limited access, an increase in the number of all kinds of threats, and an increase in the potential of violators. At enterprises and organizations in various sectors of the economy, specialists regularly conduct information security audits in order to identify vulnerabilities and ultimately to prevent possible negative consequences. To build a rational information security system at the facility, it is important to organize protection against actual threats, since it is impossible to build protection against all threats, and it is impractical. The article proposes models and algorithms for determining current threats based on an expert approach, which can become the basis for the development of an automated system for making reliable decisions in the tasks of protecting informatization objects.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"11 4","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"MODELS AND ALGORITHMS FOR IDENTIFYING CURRENT THREATS BASED ON AN EXPERT APPROACH\",\"authors\":\"\",\"doi\":\"10.18469/ikt.2023.21.3.05\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The task of identifying current security threats is becoming increasingly important, due to the increase in the volume of processed information of limited access, an increase in the number of all kinds of threats, and an increase in the potential of violators. At enterprises and organizations in various sectors of the economy, specialists regularly conduct information security audits in order to identify vulnerabilities and ultimately to prevent possible negative consequences. To build a rational information security system at the facility, it is important to organize protection against actual threats, since it is impossible to build protection against all threats, and it is impractical. The article proposes models and algorithms for determining current threats based on an expert approach, which can become the basis for the development of an automated system for making reliable decisions in the tasks of protecting informatization objects.\",\"PeriodicalId\":508406,\"journal\":{\"name\":\"Infokommunikacionnye tehnologii\",\"volume\":\"11 4\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-05-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Infokommunikacionnye tehnologii\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.18469/ikt.2023.21.3.05\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Infokommunikacionnye tehnologii","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18469/ikt.2023.21.3.05","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
MODELS AND ALGORITHMS FOR IDENTIFYING CURRENT THREATS BASED ON AN EXPERT APPROACH
The task of identifying current security threats is becoming increasingly important, due to the increase in the volume of processed information of limited access, an increase in the number of all kinds of threats, and an increase in the potential of violators. At enterprises and organizations in various sectors of the economy, specialists regularly conduct information security audits in order to identify vulnerabilities and ultimately to prevent possible negative consequences. To build a rational information security system at the facility, it is important to organize protection against actual threats, since it is impossible to build protection against all threats, and it is impractical. The article proposes models and algorithms for determining current threats based on an expert approach, which can become the basis for the development of an automated system for making reliable decisions in the tasks of protecting informatization objects.