Mathematical Model Of Evaluation Of Information And Telecommunication Systems Security

Authors: Vera Vialkova, Yanina Shestak
Affiliation: Taras Shevchenko National University of Kyiv

Category:

Keywords: information and telecommunications system, information security
ABSTRACT. Mathematical model for assessing the security of the information and telecommunications system proposed and the most common vulnerability considered in this article

References:

Information technology – Security techniques – Evaluation criteria for IɌ security – Part 1: Introduction and general model. – ISO/IEC 15408-1.1999.
Information technology – Security techniques – Evaluation criteria for IT security – Part 2: Security functional requirements. – ISO/IEC 15408-2.1999.
Information technology – Security techniques – Evaluation criteria for IT security – Part 3: Security assurance requirements. – ISO/IEC 15408-3.1999.
Oficial website TPI) [Online]. Available: http://www.caine-live.net/
ɌDP 2.7-011-2012. Criteria for assessing the security in computer systems from unauthorized access. State Service of Special Communications and Information Protection of Ukraine, 2012
Gorodetski V., Karsayev O., Kotenko I., Samoilov V. Multi-Agent Information Fusion: Methodology, Architecture and Software Tool for Learning of Object and Situation Assessment // The 7th International Conference on Information Fusion. Proceedings. Stockholm, Sweden. June 28 – July 1, 2004
Kotenko I.V. Perspective directions of research in the field of computer security / I.V. Kotenko, R.M. Yusupov // Data protection INSIDE № 2’2006. P-50-54
Abramov E.S. Application of attack graphs for modeling of malicious network impacts / Е.ɋ. Abramov. [Online]. Available: https://cyberleninka.ru/article/n/primenenie-grafov-atak-dlyamodelirovaniya-vredonosnyh-setevyh-vozdeystviy