ASSESSMENT METHOD OF THE ATTAKS INFLUENCE ON THE INFOCOMUNICATION NETWORK ACCORDING TO EXISTING VARIABILITY

Abstract

The article explores methods for assessing vulnerabilities and the spread of an attack in an infocommunication network. A proactive approach to the quantitative assessment of network security, which allows us to assess risks at the user and network level through the of existing vulnerabilities is presented. The proposed solutions will be useful for decision making and will be further integrated into a single metric for displaying the integrated level of security of the infocommunication network.

Authors and Affiliations

М. О. Євдокименко, А. С. Шаповалова

Keywords

Related Articles

LOG FILES PROCESSING AND ANALYSIS BY LOGHELPER SOFTWARE PRODUCT

The article discusses a software product that works with log files that are unclear to the simple user. The method of saving log files, their analysis and making decisions on corrections of detected errors of the user in...

THE MAIN INDICES OF FRUIT AND BERRIES’ SUITABILITY TO FREEZING

The author of the article presented the results of researching the biochemical composition of various wild and cultivated fruit and berries, according to the certain indices recommended by other scientists to examine as...

IMPROVING THE PROPERTIES OF CONCRETE FOR 3D PRINTING

In work the analysis of used materials is carried out at 3D printing in construction. To increase productivity and ensure high quality 3D printing, it is necessary to use concrete with enhanced properties. It is proposed...

SOME ASPECTS OF GEOMETRICAL MODELING OF TECHNICAL OBJECTS AND PROCESSES FOR FORMING POLYMER COMPOSITES. 2. MODELING OF THE STRUCTURE OF DISPERSE-FILLED THERMOSETS, AS WELL AS THE DESIGN OF TECHNOLOGY AND EQUIPMENT FOR MOLDING POLYMER COMPOSITES

Various aspects of geometric modeling of technical objects and processes of molding of unfilled and filled polymer composites are analyzed. The problems of modeling the structure and properties of disperse-filled thermos...

HTTP DATA CIPHERING ALGORITHM

Purpose. Modern tends of IT systems evolution are to fill all spheres of human life. Most of all, for connection and data transfer the HTTP protocol is used. Due to its oldness many modern problems find no simple solutio...

Download PDF file
  • EP ID EP580942
  • DOI -
  • Views 49
  • Downloads 0

How To Cite

М. О. Євдокименко, А. С. Шаповалова (2018). ASSESSMENT METHOD OF THE ATTAKS INFLUENCE ON THE INFOCOMUNICATION NETWORK ACCORDING TO EXISTING VARIABILITY. Вчені записки Таврійського національного університету імені В. І. Вернадського. Серія: Технічні науки, 29(4), 67-72. https://europub.co.uk/articles/-A-580942