Analysis of results of audit of system of information security with application of a complex comparative assessment

Download article in PDF format

Authors: Danilova O. T., Shirokov E. V.

Annotation: In this article we propose a method based on a set of comparative evaluations, to analyze the data security system. The advantages of this method are as follows: firstly, It is based on an interdisciplinary approach to the assessment of such complex phenomena as the structural changes occurring in the system of protection, and secondly, the logic of this technique allows to overcome the shortcomings of methods for assessing structural changes and thus avoid the subjectivity of the individual indicators, and thirdly, the methods are simple and flexible.

Keywords: information security, complex assessment, methodology of evaluation

Editorial office address

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 701-582

  journal@tusur.ru

 

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates