Analysis of results of audit of system of information security with application of a complex comparative assessment
Download article in PDF format
Authors: Danilova O. T., Shirokov E. V.
Annotation: In this article we propose a method based on a set of comparative evaluations, to analyze the data security system. The advantages of this method are as follows: firstly, It is based on an interdisciplinary approach to the assessment of such complex phenomena as the structural changes occurring in the system of protection, and secondly, the logic of this technique allows to overcome the shortcomings of methods for assessing structural changes and thus avoid the subjectivity of the individual indicators, and thirdly, the methods are simple and flexible.
Keywords: information security, complex assessment, methodology of evaluation