Please use this identifier to cite or link to this item:
http://elar.tsatu.edu.ua/handle/123456789/18193
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Emanov, Vladislav | - |
dc.contributor.author | Pasichnyk, Vasyl | - |
dc.contributor.author | Yevtushenko, Ihor | - |
dc.contributor.author | Larin, Stanislav | - |
dc.contributor.author | Mykhailenko, Olena | - |
dc.contributor.author | Михайленко, Олена Юріївна | - |
dc.date.accessioned | 2024-12-04T22:54:43Z | - |
dc.date.available | 2024-12-04T22:54:43Z | - |
dc.date.issued | 2023 | - |
dc.identifier.citation | Ranking Threats to Determine the Cost of Protecting Information in a Cybersecurity Environment. Emanov V., Pasichnyk V… Olena Mykhailenko. Ingénierie des Systèmes d’Information.2023. vol. 28(1). P.77-84 .DOI: 10.18280/isi.280108 | uk |
dc.identifier.uri | http://elar.tsatu.edu.ua/handle/123456789/18193 | - |
dc.description.abstract | The main purpose of the study is to rank certain threats in order to establish further costs for ensuring the protecting of information in the cybersecurity system. Research methodology is a set of methods that form a methodological approach. The main ones are the ranking method through the theory of fuzzy relations and the expert-step method. As a result, due to the ranking of the threats of the selected object, the permissible intensity of the decrease in the level of security and the costs of its provision were determined using the proposed methodology. The study is limited by selecting only one socio-economic system and its information. The results obtained as a result of the research carried out in the article have practical and scientific value through a methodical approach to form requirements for the security of the cybersecurity system itself and information of a single object. In the future, more complex socio-economic systems and their cybersecurity should be chosen to apply the methodological approach proposed in the article. | uk |
dc.language.iso | en | uk |
dc.subject | Information | uk |
dc.subject | Cybersecurity | uk |
dc.subject | Threats | uk |
dc.subject | Security | uk |
dc.subject | Ranking | uk |
dc.title | Ranking Threats to Determine the Cost of Protecting Information in a Cybersecurity Environment. | uk |
dc.title.alternative | Ранжування загроз для визначення вартості захисту інформації в середовищі кібербезпеки. | uk |
dc.type | Article | uk |
local.identifier.doi | DOI: 10.18280/isi.280108 | uk |
Appears in Collections: | Кафедра Інженерної механіки та комп'ютерного проектування |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Ranking Threats_2023.pdf | 795.31 kB | Adobe PDF | ![]() View/Open |
Show simple item record
CORE Recommender
???jsp.display-item.check???
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.