Abstract
This paper describes one method used for risk assessment and determines the direction of further research in this field.
Similar content being viewed by others
References
Chereshkin, D.S. and Kononov A.A. Automated Construction of Models of Threats and Models of Protection of Information Systems Using Complex Expert System “AvanGard”, Proc. Interregional Conference “Information Security of Regions of RF ISRRF-9, St. Petersburg, October 13–15, 1999, vol. 1, p. 27.
Kononov, A.A. and Burdin, O.A., An Example of Automation of Audit and Control of Information Security of a Company, in: S. A. Petrenko, A. A. Petrenko, Audit of Intranet Security (Moscow, DMK press, 2002) [in Russian], 286–332.
Kononov, A.A. and Burdin, O.A., Axiomatics of Assessment of Risks of Violation of Computerized Organizational Systems Security, Problemy Informatsionnoi Bezopasnosti, 2002, no. 1, pp. 27–30.
Chereshkin, D.S. and Kononov, A.A., Axiomatics of Assessment of Risk-Generating Potentials of Computerization of Organizational Systems, Informatsionnaya Mathematika, 2003, no. 1, pp. 29–32.
Chereshkin, D.S., Tsygichko, V.N., and Kononov, A.A., Control Problems of Regional Informational Infrastructure Security, Nauch.-Tekh. Inf., Ser. 1, 2003, no. 8, pp. 1–9.
Burdin, O.A., Kononov, A.A., A Method of Assessment of Risk-Generating Potentials in Computerized Organizational Systems, Nauch.-Tekh. Inf., Ser. 1, 2004, no. 2, pp. 19–21.
Additional information
Original Russian Text © A.B. Volftrub, A.K. Polikarpov, 2007, published in Nauchno-Tekhnicheskaya Informatsiya, Seriya 2, 2006, No. 12, pp. 32–34.
About this article
Cite this article
Volftrub, A.B., Polikarpov, A.K. Methods of multifactor damage risk management in automated information systems. Autom. Doc. Math. Linguist. 41, 46–52 (2007). https://doi.org/10.3103/S0005105507010074
Received:
Issue Date:
DOI: https://doi.org/10.3103/S0005105507010074