CYBER SECURITY METHODS AND CALCULATION OF CYBER RISKS
Abstract and keywords
Abstract (English):
The article presents effective scientifically based methods of ensuring cybersecurity, as well as the calculation of cyber risks and their assessment. All items are designed correctly and consistently. The article discusses several ways of calculating cyber risks to identify the most effective, shows the derived formulas for calculating risks, as well as potential damage, which must be taken into account when choosing measures and methods to ensure information security of all databases and systems. Using the example of a number of courts, the most effective methods of protecting information security were considered and proved. One of these methods to prevent cyber-hacking is the combined method, which increases the security of the system several times. The formula of the efficiency coefficient is given, which shows that the more methods are used to protect the system, the higher its security. In connection with the above, we can conclude: using all the necessary effective methods to ensure information security, recommendations for the prevention of cybercrime and performing a risk assessment calculation in an effective way, it is possible to avoid cyber intrusions and unauthorized access to all important information resources.

Keywords:
Information security, cyber security, virus, antivirus program, cyber risk, cyber hacking, cyber security plan, confidential informational data
Text
Publication text (PDF): Read Download
References

1. Neyton Haus. Polnyy kurs po kiberbezopasnosti: Sekrety hakerov. Tom 1. 271s.

2. Bapshy P. N., Baranova E. K., Babash A. V. Informacionnaya bezopasnost': uchebno-prakticheskoe posobie. - M., Evraziyskiy otkrytyy institut, 2011.-375s.

3. Skripnik D. A. Obschie voprosy tehnicheskoy zaschity informacii. - M., Nacional'nyy Otkrytyy Universitet «INTUIT», 2016. - 425s.

4. [Elektronnyy resurs] Klassifikaciya metodov zaschity informacii - Sayt: http://camafon.ru

5. ISO/IEC 27001. Mezhdunarodnyy standart soderzhit trebovaniya v oblasti informacionnoy bezopasnosti dlya sozdaniya, razvitiya i podderzhaniya sistemy menedzhmenta informacionnoy bezopasnosti. 20s.

6. EOST ISO/MEK TO 7. Nacional'nyy standart Rossiyskoy Federacii. Metody i sredstva obespecheniya bezopasnosti. Chast' 3. Metody menedzhmenta bezopasnosti informacionnyh tehnologiy. Moskva. 20s.

7. BS 7799-2:2005 Specifikaciya sistemy upravleniya informacionnoy bezopasnost'yu. Angliya. 20s.

8. Baranova, E.K. Informacionnaya bezopasnost' i zaschita informacii: uchebnoe posobie / E.K. Baranova, A.V. Babash. - M.: Rior, 2018. - 400 s.


Login or Create
* Forgot password?