Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions


Citar

Texto integral

Acesso aberto Acesso aberto
Acesso é fechado Acesso está concedido
Acesso é fechado Somente assinantes

Resumo

The problem of automation of the process of detecting weaknesses in information systems based on the analysis of its vulnerabilities is solved. The input data used for the classification, the process of their preparation, and the classification results are described. The interpretation and analysis of the results are presented. The problem solved is a part of the approach proposed by the authors to automatic formation of a set of required security tools for a particular information system. A necessary set of security tools is determined by the set of possible threats.

Sobre autores

E. Doynikova

St. Petersburg Institute for Informatics and Automation, Russian Academy of Sciences

Autor responsável pela correspondência
Email: elenadoynikova@mail.ru
Rússia, St. Petersburg, 199178

A. Fedorchenko

St. Petersburg Institute for Informatics and Automation, Russian Academy of Sciences

Email: ivkote1@mail.ru
Rússia, St. Petersburg, 199178

I. Kotenko

St. Petersburg Institute for Informatics and Automation, Russian Academy of Sciences

Autor responsável pela correspondência
Email: ivkote1@mail.ru
Rússia, St. Petersburg, 199178

Arquivos suplementares

Arquivos suplementares
Ação
1. JATS XML

Declaração de direitos autorais © Allerton Press, Inc., 2019