Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Oleksandr Bakalynskyi"'
Publikováno v:
Науковий вісник державне управління. :136-162
Publikováno v:
Collection "Information Technology and Security". 8:92-101
Publikováno v:
Collection "Information technology and security". 6:94-104
Рассмотрены особенности представления оценок рисков информационной безопасности картами риска. На практике такая карта отображается
Publikováno v:
Collection "Information Technology and Security"; Vol. 6 No. 1 (2018); 75-84
Сборник "Information Technology and Security"; Том 6 № 1 (2018); 75-84
Collection "Information Technology and Security"; Том 6 № 1 (2018); 75-84
Сборник "Information Technology and Security"; Том 6 № 1 (2018); 75-84
Collection "Information Technology and Security"; Том 6 № 1 (2018); 75-84
Methods of resenting information security risk assessments are considered. The method are divided into a tree of risks, a rose (star) and a helix of risks, a risk map and an acceptability risk corridor. The classic tree construction method is used to
Publikováno v:
Collection "Information technology and security". 5:71-82
It is considered the dependence of the level of simple risk on the likelihood of its implementation. Analytical geometry is used to interpret this dependence. It is shown the nonlinear character of its dependence, which leads to the complexity of its
Autor:
Heorhii Krykhovetskyi, Volodymyr Mokhor, Ihor Bohdanov, Vasyl Tsurkan, Yaroslav Dorohyi, Oleksandr Bakalynskyi, Serhii Mykhailov
Publikováno v:
Collection "Information technology and security". 4:255-261
Publikováno v:
Збірник "Information Technology and Security"; Том 4, № 1 (2016): Information Technology and Security; 100-107
Сборник "Information Technology and Security"; Том 4, № 1 (2016); 100-107
Collection "Information technology and security"; Том 4, № 1 (2016): Information Technology and Security; 100-107
Сборник "Information Technology and Security"; Том 4, № 1 (2016); 100-107
Collection "Information technology and security"; Том 4, № 1 (2016): Information Technology and Security; 100-107
Requirement for the protection state information resources is determined by the law Ukraine. Complex systems of information protection or information security management system is rooted for this. It is necessary to determine eligibility of criteria