Basic q-analysis of MCQA for Information Security System
##plugins.themes.bootstrap3.article.main##
Article explores application methods for systems structural analysis to use in study of security in information systems, which is based on variants of general attack scenarios, features of cybersecurity culture, q-analysis, which is part of MCQA . General security system analysis usually is based on different factors, which include technical means, human-related mistakes in different ways and respond to security incidents. Q-analysis presents the basic principles of constructing model of information security systems elements connectivity on the example of two sets: set of threats and sets of security measures for information security and calculated numerical values. Elements of the two sets of are interconnected and form the basis of a system for ensuring their security. These calculations can be used to further determine overall formal assessment of security of the organization.
Downloads
References
-
??????? ?.?. ???? ???????? i??????i???i? ?? ?????????? ?????i? ??????? i???????i???? ??-??????i? , ?????? i???????i?., ?1 (50), 2011, c.42?47.
Google Scholar
1
-
Dhillon G. Managing information system security/ Dhillon G., London: Macmillan, 1997, pp 137-172.
Google Scholar
2
-
Helokunnas T. Information security culture in a value net. In: Engineering Management Conference, IEMC?03 on Managing Technologically Driven Organizations: The Human Side of Innovation and Change, New York: IEEE Press, 2003, pp. 190?194.
Google Scholar
3
-
Mitnick K.D. The art of deception: controlling the human element of security, Wiley Publishing, 2002, p. 3.
Google Scholar
4
-
Potiy A. V. The prerequisites of information security culture development and an approach to complex evaluation of its level, ??????????????? ? ??????????? ???????, ? 5, 2012, p. 72?77.
Google Scholar
5
-
Siponen M.T. Five dimensions of information security awareness, Computers and Society, 2001, pp 24 -29
Google Scholar
6
-
Van Niekerk J.F. Information security culture: A management perspective, Computers & Security, 2010, p.478.
Google Scholar
7
-
2014 Data Breach Investigation Report, Verizon Enterprise Solutions, 2013
Google Scholar
8
-
2015 Data Breach Investigation Report, Verizon Enterprise Solutions, 2014
Google Scholar
9
-
2016 Data Breach Investigation Report, Verizon Enterprise Solutions, 2015
Google Scholar
10
-
2017 Data Breach Investigation Report, Verizon Enterprise Solutions, 2016
Google Scholar
11
-
L. Duckstein, S.A, Nobe / European Journal of Operational Research, 103 (1997) , 411-425
Google Scholar
12
-
????? ?.?. ?????????????? ????????????; ?????????????? ? ???????????????? ?????? ?????? ??????????. ????. ??????? ??? ?????.-?: ??????? ?????-???????, 2004, 280?.
Google Scholar
13
-
???????? ?.?. ??????? ?? ?????????????-????????????? ??????. ??????????: ????, ??????, ??????. ?.: ???. ????, 2001.
Google Scholar
14
-
????? ?.?. ??????????? ?????????? ????????????. ?.: "?????? ???", 2002.
Google Scholar
15
-
?????????? ?.?. ? ??. ?????????????? ???????????? ???????????. ?.: "?????? ? ?", 2004.
Google Scholar
16
-
???????? ?.?., ??????? ?.?. ?????? ?.?. ????????????? ? ?????? ??????. IDEF-??????????: ?????????, 2006.
Google Scholar
17
-
Cyber Security Culture in organisations, ENISA, 2017
Google Scholar
18