Evaluation of Effectiveness of Reduction InformationRisk Using Fuzzy Algorithm
This article considers the problem of effective riskevaluation in the informational system. Risk evaluation is themain step in the ISMS process. The article uses the standardsISO / IEC 27001 and ISO / IEC 27005. As an example, the threatmodel formed for the state information system is considered.
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
FRUCT
2019-04-01
|
Series: | Proceedings of the XXth Conference of Open Innovations Association FRUCT |
Subjects: | |
Online Access: | https://fruct.org/publications/abstract24/files/Bol.pdf
|
id |
doaj-51e4c3b29acb4160a67b5d1792873002 |
---|---|
record_format |
Article |
spelling |
doaj-51e4c3b29acb4160a67b5d17928730022020-11-24T21:31:45ZengFRUCTProceedings of the XXth Conference of Open Innovations Association FRUCT2305-72542343-07372019-04-0185424584588Evaluation of Effectiveness of Reduction InformationRisk Using Fuzzy AlgorithmAlexander Bolshakov0Ekaterina Rogatneva1MTUCI, Moscow, RussiaMTUCI, Moscow, RussiaThis article considers the problem of effective riskevaluation in the informational system. Risk evaluation is themain step in the ISMS process. The article uses the standardsISO / IEC 27001 and ISO / IEC 27005. As an example, the threatmodel formed for the state information system is considered.https://fruct.org/publications/abstract24/files/Bol.pdf Risk AssessmentFuzzy LogicRisk AnalysisInformation Security |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Alexander Bolshakov Ekaterina Rogatneva |
spellingShingle |
Alexander Bolshakov Ekaterina Rogatneva Evaluation of Effectiveness of Reduction InformationRisk Using Fuzzy Algorithm Proceedings of the XXth Conference of Open Innovations Association FRUCT Risk Assessment Fuzzy Logic Risk Analysis Information Security |
author_facet |
Alexander Bolshakov Ekaterina Rogatneva |
author_sort |
Alexander Bolshakov |
title |
Evaluation of Effectiveness of Reduction InformationRisk Using Fuzzy Algorithm |
title_short |
Evaluation of Effectiveness of Reduction InformationRisk Using Fuzzy Algorithm |
title_full |
Evaluation of Effectiveness of Reduction InformationRisk Using Fuzzy Algorithm |
title_fullStr |
Evaluation of Effectiveness of Reduction InformationRisk Using Fuzzy Algorithm |
title_full_unstemmed |
Evaluation of Effectiveness of Reduction InformationRisk Using Fuzzy Algorithm |
title_sort |
evaluation of effectiveness of reduction informationrisk using fuzzy algorithm |
publisher |
FRUCT |
series |
Proceedings of the XXth Conference of Open Innovations Association FRUCT |
issn |
2305-7254 2343-0737 |
publishDate |
2019-04-01 |
description |
This article considers the problem of effective riskevaluation in the informational system. Risk evaluation is themain step in the ISMS process. The article uses the standardsISO / IEC 27001 and ISO / IEC 27005. As an example, the threatmodel formed for the state information system is considered. |
topic |
Risk Assessment Fuzzy Logic Risk Analysis Information Security |
url |
https://fruct.org/publications/abstract24/files/Bol.pdf
|
work_keys_str_mv |
AT alexanderbolshakov evaluationofeffectivenessofreductioninformationriskusingfuzzyalgorithm AT ekaterinarogatneva evaluationofeffectivenessofreductioninformationriskusingfuzzyalgorithm |
_version_ |
1725959929622167552 |