Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс: https://dspace.ncfu.ru/handle/123456789/32456
Название: Development of an Information Security Risk Assessment Model Through the Calculation of the Vulnerability Danger Factor
Авторы: Mezentseva, O. S.
Мезенцева, О. С.
Ключевые слова: CVSS;Risk assessment;Information security;National programme
Дата публикации: 2026
Издатель: Springer Science and Business Media Deutschland GmbH
Библиографическое описание: Utenkova, M., Komkov, A., Maksimova, E., Mezentseva, O. Development of an Information Security Risk Assessment Model Through the Calculation of the Vulnerability Danger Factor // Lecture Notes in Networks and Systems. - 2026. - 1456 LNNS. - pp. 434 - 441. - DOI: 10.1007/978-3-032-07275-7_39
Источник: Lecture Notes in Networks and Systems
Краткий осмотр (реферат): The relevance and necessity of research in the field of information security risk assessment are justified against the backdrop of the trend towards digitalization and as part of the national projects “Digital Economy” and its successor “Data Economy and Digital Transformation of the State”. The existing standards for information security risk management have been analyzed. A description has been given of the classic statistical risk assessment model and a dynamic model that takes into account a parameter responsible for the intensity of destructive effects accumulation. The disadvantages of the classic risk assessment model have been identified, which relate to problems with expert assessments that affect the quality of the assessment: the lack of accumulated statistics over the years or lack of qualified experts. An analysis has been conducted of the open standard for vulnerability danger quantification, CVSS. A risk assessment model has been developed based on an evaluation of the risk associated with CVSS vulnerabilities. The possibility of defining risk as a combination of two linguistic variables has also been considered. The model is described using linguistic fuzzy logic, and the levels of danger for each parameter in the revised model are determined. Additionally, the option of modifying the model to include the cost of addressing the vulnerability has been explored. Prospects for further development of this approach are discussed.
URI (Унифицированный идентификатор ресурса): https://dspace.ncfu.ru/handle/123456789/32456
Располагается в коллекциях:Статьи, проиндексированные в SCOPUS, WOS

Файлы этого ресурса:
Файл РазмерФормат 
scopusresults 3838.pdf
  Доступ ограничен
128.29 kBAdobe PDFПросмотреть/Открыть


Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.