RUS  ENG
Full version
JOURNALS // Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics // Archive

Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2011 Number 2, Pages 74–79 (Mi vagtu127)

This article is cited in 1 paper

COMPUTER SOFTWARE AND COMPUTING EQUIPMENT

Technique of threats set formation for an information object

S. V. Belov

Astrakhan State Technical University

Abstract: The problem of formation of actual threats list for an information object is considered in the paper. Quantitative estimations of threats of information security (probability of accomplishment; losses connected with threat accomplishment and time) and factors influencing their estimation are considered. The generalized structure scheme of threats model formation, consisting of three basic stages is shown: formation of a general database of threats; design of initial set of threats on the basis of knowledge of the information object; formation of the list of actual threats on the basis of expert methods. Criteria of experts selection are generated for an expert group, and estimations are resulted for the level of experts’ competence.

Keywords: information security, risks, system analysis, classification, analysis technique.

UDC: [002.52:004.056.5]:34.03

Received: 20.06.2011



© Steklov Math. Inst. of RAS, 2025