Substantiation of Information Security Measures
Keywords:
Information Security, Optimization, Methods, ProgramsAbstract
There has been presented an approach to substantiate information security measures with account of value of protected information resources. There has been considered a model of value of these resources. There has been presented mathematical formulation and an algorithm for solving the problem of searching for expedient information security measures providing for synthesis and analysis of possible programs of destructive influence on protected information resources. The modeling results are provided.
Published
2013-04-19
How to Cite
Osipov, V., & Nosal, I. (2013). Substantiation of Information Security Measures. Information and Control Systems, (2), 48-53. Retrieved from http://proceedings.spiiras.nw.ru/index.php/ius/article/view/13622
Issue
Section
Information security