COMPARATIVE ANALYSIS OF MODELS OF ATTACKS ON INFORMATION SECURITYS

Authors

DOI:

https://doi.org/10.31891/2219-9365-2024-80-21

Keywords:

security models, attack models, information systems, information security threats

Abstract

To ensure information security, it is necessary to: determine the goals and objectives of the information system; to investigate business processes in the information system (functional subsystems, modules and their functions); identify all users of the information system; roles and powers of users in the information system (access rights), a list of information technologies that ensure the execution of business processes (IT infrastructure, software, including information protection tools, models and methods of user access to the information system, etc.). Directly in the area of information security, it is necessary to determine the current violator in the information system, determine the list of current information security threats (information security threat modeling), design and implement an information security system (information protection system), as well as carry out on a regular basis a qualitative assessment of the effectiveness of the information protection system.

One of the most important tasks from the above is the choice of a method of modeling threats to information security and attacks on information systems, which is what this article is dedicated to.

Based on the analysis of information security threat modeling methods, it can be concluded that all existing attack models have a number of common shortcomings. It is possible to improve the quality of the definition (simulation) of current information security threat models by determining the necessary and sufficient indicators and automating the process to eliminate hypothetical errors of experts.

Published

2024-11-28

How to Cite

TITOVA В., KLOTS Ю., LAKOTSENIN З., SHLAPAK О., & ТРОЦ, В. (2024). COMPARATIVE ANALYSIS OF MODELS OF ATTACKS ON INFORMATION SECURITYS. MEASURING AND COMPUTING DEVICES IN TECHNOLOGICAL PROCESSES, (4), 174–178. https://doi.org/10.31891/2219-9365-2024-80-21