A risk-oriented approach to the control arrangement of security protection subsystems of information systems


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

We have considered the methodological situation of the development of models and methods of decision-making support for control in the security protection subsystems of information systems to neutralize external and internal influences, which can lead to accidental or premeditated unauthorized access to stored and processed information in the system, and its distortion or destruction.

About the authors

V. G. Anisimov

Peter the Great St. Petersburg Polytechnic University

Author for correspondence.
Email: an-33@yandex.ru
Russian Federation, St. Petersburg, 195251

P. D. Zegzhda

Peter the Great St. Petersburg Polytechnic University

Author for correspondence.
Email: zeg@ibks.ftk.spbstu.ru
Russian Federation, St. Petersburg, 195251

E. G. Anisimov

Russian Military Academy of the General Staff

Email: zeg@ibks.ftk.spbstu.ru
Russian Federation, Moscow, 119571

D. A. Bazhin

Mozhaiskii Military Space Academy

Email: zeg@ibks.ftk.spbstu.ru
Russian Federation, St. Petersburg, 197198


Copyright (c) 2016 Allerton Press, Inc.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies