Model of typical threats to information security based on the model of information flows

Download article in PDF format

Authors: Egoshin N. S.

Annotation: The information security process involves an integrated approach. It is necessary to cover all possible aspects in the field of information protection to define a complete list of threats and in the future use this list of threats according to a specific system. It is important to make it more complete possible, since if ever it is missing any element, the chances for the threats to appear increase dramatically. Thus, it is necessary to form a threat model allowing to provide a complete list of threats. The threat models should become the starting points for the design of future security systems for computer and information systems.

Keywords: information security, information protection, threat model, information flow

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates