A risk-oriented approach to the control arrangement of security protection subsystems of information systems


如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

We have considered the methodological situation of the development of models and methods of decision-making support for control in the security protection subsystems of information systems to neutralize external and internal influences, which can lead to accidental or premeditated unauthorized access to stored and processed information in the system, and its distortion or destruction.

作者简介

V. Anisimov

Peter the Great St. Petersburg Polytechnic University

编辑信件的主要联系方式.
Email: an-33@yandex.ru
俄罗斯联邦, St. Petersburg, 195251

P. Zegzhda

Peter the Great St. Petersburg Polytechnic University

编辑信件的主要联系方式.
Email: zeg@ibks.ftk.spbstu.ru
俄罗斯联邦, St. Petersburg, 195251

E. Anisimov

Russian Military Academy of the General Staff

Email: zeg@ibks.ftk.spbstu.ru
俄罗斯联邦, Moscow, 119571

D. Bazhin

Mozhaiskii Military Space Academy

Email: zeg@ibks.ftk.spbstu.ru
俄罗斯联邦, St. Petersburg, 197198

补充文件

附件文件
动作
1. JATS XML

版权所有 © Allerton Press, Inc., 2016