To obtain access to full text of journal and articles you must register!
- Article name
- Mathematical models of operational information security
- Authors
- Shcheglov K. A., , , St.-Petersburg State University of Information Technology, Mechanics and Optics, St.-Petersburg, Russia
Shcheglov A. Yu., , info@npp-itb.spb.ru, St.-Petersburg State University of Information Technology, Mechanics and Optics, St.-Petersburg, Russia
- Keywords
- informational system / information security / security system / threat / attack / intruder / model / design
- Year
- 2014 Issue 3 Pages 52 - 65
- Code EDN
- Code DOI
- Abstract
- We review mathematical models operational information security - threat model, attack model, intruder model, which can be used while informational security systems design. Suggested security systems design method, including operational design, assumes using only operational parameters of information and security systems, i.e. real parameters, determined basing on threat statistics (existing and determined while information system operation) - their detection and elimination statistics. This allows to talk about adequacy of suggested models because of using this method doesn't require form and use of any quantitative or qualitative expert assessments while building this models.
- Text
- To obtain access to full text of journal and articles you must register!
- Buy