Calculation of damage risks by the method of expert evaluation for the protection of enterprise information resources

МРНТИ 28.17.31                                                                                         №1 (2021г.)

PDF

Amirbay A.A., Mukhanova  A.A.

 

The article deals with the problem of ensuring information security, as well as creating a system for monitoring threats for the successful implementation of measures to protect information resources in a computer system and the implementation of a complete integrated algorithm for calculating risks based on functional subsystems of the SIEM system. The work proposed the creation of a database based on expert assessment, when an enterprise is exposed to threats of information resources in a computer system. In addition, to prevent costs, as well as the minimum effective way to store information resources, it is recommended to use encryption in the form of a triplet and the creation of an algorithm for storing triplets in repositories.
Keywords: threat, risk, triple, triplestorage.

References

1 Kotenko I.V., Stepashkin M.V. Metriki bezopasnosti dlya oczenki urovnya zashhishhennosti komp`yuterny`kh setej na osnove postroeniya grafov atak // Zashhita informaczii. Insajd, – 2009.- № 3. – S.36–45. [Kotenko I.V., Stepashkin M.V. Metriki bezopasnosti dlya otsenki urovnya zashhishhennosti komp’yuternykh setej na osnove postroeniya grafov atak // Zashhita informatsii. Insajd, – 2009.- № 3. – S.36–45.]

2 A. Fedotov. A. Muhanova. Vulnerability Classification of Information Security in Corporate Systems. International Journal of INFORMATION (Indexed by Scopus, JDream, Mathematical Reviews, Zentralblatt MATH, ProQuest, Swets, EBSCO). – 2014. – Vol.17, No.1.- pp.219-228.

3 Dojnikova E.V., Kotenko I.V. Rasshirenie metodiki oczenki informaczionny`khriskov za schet ispol`zovaniya grafov zavisimostej servisov // Sankt-Peterburg. Izdatel`stvo Politekhnicheskogo universiteta. – 2011. – C.71-72 [Dojnikova E.V., Kotenko I.V. Rasshirenie metodiki otsenki informatsionnykhriskov za schet ispol’zovaniya grafov zavisimostej servisov // Sankt-Peterburg. Izdatel’stvo Politekhnicheskogo universiteta. – 2011. – C.71-72]

4 Fedotov. A.M., Revnivy`kh A.V.A.A. Mukhanova. Klassifikacziya ugroz i uyazvimostej informaczionnoj bezopasnosti v korporativny`kh sistemakh.Vestnik. Seriya informaczionny`kh tekhnologij.– Novosibirsk: NGU, – 2013. – T.11. V. 2. – S.55-72. [Fedotov. A.M., Revnivykh A.V.A.A. Mukhanova. Klassifikatsiya ugroz i uyazvimostej informatsionnoj bezopasnosti v korporativnykh sistemakh. Vestnik. Seriya informatsionnykh tekhnologij.– Novosibirsk: NGU, – 2013. – T.11 V. 2. – S.55-72.]

5 Kireenko A. E. Sovremenny`e problemy` v oblasti informaczionnoj bezopasnosti: klassicheskie ugrozy`, metody` i sredstva ikh predotvrashheniya // Molodoj ucheny`j. – 2012. #3. – S. 215-237. [Kireenko A. E. Sovremennye problemy v oblasti informatsionnoj bezopasnosti: klassicheskie ugrozy, metody i sredstva ikh predotvrashheniya // Molodoj uchenyj. – 2012. – №3. – S. 215-237.]

6 Kotenko I.V., Voronczov V.V., Proaktivny`e mekhanizmy` zashhity` ot setevy`kh chervej: podkhod, realizacziya i rezul`taty` e`ksperimentov. № 1, – 2009. – C.37–42. [Kotenko I.V., Vorontsov V.V., Proaktivnye mekhanizmy zashhity ot setevykh chervej: podkhod, realizatsiya i rezul’taty ehksperimentov. # 1, – 2009. – C.37–42.]

7 Mukhanova A.A., Amirbaj A.A. Raschet riskov na osnove ob`ektivny`kh oczenok dlya uyazvimostiinformaczii v komp`yuternoj sisteme predpriyatiya // XVII Mezhdunarodnaya nauchno-prakticheskaya konferencziya «Rossijskaya nauka v sovremennom mire».-Moskva: MGU, 2018. – S.140-142 [Mukhanova A.A., Amirbaj A.A. Raschet riskov na osnove ob»ektivnykh otsenok dlya uyazvimostiinformatsii v komp’yuternoj sisteme predpriyatiya // XVII Mezhdunarodnaya nauchnoprakticheskaya konferentsiya «Rossijskaya nauka v sovremennom mire».Moskva: MGU, 2018. – S.140-142]

8 Miller D.R., Harris Sh., Harper A.A., VanDyke S., Black Ch. Security Information and Event Management (SIEM) Implementation. McGraw–Hill Companies. 2011. – 430 p.

9 Derevyanko A.V. Postroenie e`mpiricheskikh modelej dlya upravleniya slozhny`mi tekhnologicheskimi proczessami. 2009. – Vy`p.12, № 863. – S. 101110. [Derevyanko A.V. Postroenie ehmpiricheskikh modelej dlya upravleniya slozhnymi tekhnologicheskimi protsessami. 2009. – Vyp.12, № 863. – S. 101-110.]

10 Chechulin A.A., Kotenko I.V. Analiz proiskhodyashhikh v real`noj seti soby`tij naosnove ispol`zovaniya sistemy` modelirovaniya setevy`kh atak // VII Sankt-Peterburgskaya mezhregional`naya konferencziya «Informaczionnaya bezopasnost` regionov Rossii (IBRR–2011). 26–28 oktyabrya 2011 g. – S.97–98. [CHechulin A.A., Kotenko I.V. Analiz proiskhodyashhikh v real’noj seti sobytij naosnove ispol’zovaniya sistemy modelirovaniya setevykh atak // VII Sankt-Peterburgskaya mezhregional’naya konferentsiya «Informatsionnaya bezopasnost’ regionov Rossii (IBRR–2011). 26–28 oktyabrya 2011 g. – S.97–98.]

11 Abdenov A.Zh., Abdenova G.A., Amirbaj A.A., Kulbaev D.R. Marketingovy`e informaczionny`e uslugi v SIEM-sistemakh // Vestnik ENU. Seriya estestvenno-tekhnicheskikh nauk. – Astana: ENU, 2017. -#4(119). – S.24-35. [Abdenov A.ZH., Abdenova G.A., Amirbaj A.A., Kulbaev D.R. Marketingovye informatsionnye uslugi v SIEM-sistemakh // Vestnik ENU. Seriya estestvenno-tekhnicheskikh nauk. – Astana: ENU, 2017. -№4(119). – S.24-35.]

12 Dojnikova E.V., Chechulin A.A., Kotenko I.V., Kotenko D.I. Rasshirenie metodikioczenki informaczionny`kh riskov dlya ucheta atak nulevogo dnya . 2011. – S.52-60. [Dojnikova E.V., CHechulin A.A., Kotenko I.V., Kotenko D.I. Rasshirenie metodikiotsenki informatsionnykh riskov dlya ucheta atak nulevogo dnya . 2011. – S.52-60.]

13 Kotenko I.V., Konovalov A.M., Shorov A.V. Agentno-orientirovannoe modelirovanie bot-setej i mekhanizmov zashhity` ot nikh // Voprosy` zashhity` informaczii, – № 3, – 2011. – S.24–29. [Kotenko I.V., Konovalov A.M., SHorov A.V. Agentno-orientirovannoe modelirovanie bot-setej i mekhanizmov zashhity ot nikh // Voprosy zashhity informatsii, – № 3, – 2011. – S.24–29]

14 Czirlov V.L. Osnovy` informaczionnoj bezopasnosti avtomatizirovanny`kh sistem: kratkij kurs. – M.: Feniks, 2008. – 304 s. [TSirlov V.L. Osnovy informatsionnoj bezopasnosti avtomatizirovannykh sistem: kratkij kurs. – M.: Feniks, 2008. – 304 s]

 

 

 

 

Комментарии закрыты.