Automation of Information Security Risk Assessment

3Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.

Abstract

An information security audit method (ISA) for a distributed computer network (DCN) of an informatization object (OBI) has been developed. Proposed method is based on the ISA procedures automation by using Bayesian networks (BN) and artificial neural networks (ANN) to assess the risks. It was shown that such a combination of BN and ANN makes it possible to quickly determine the actual risks for OBI information security (IS). At the same time, data from sensors of various hardware and software information security means (ISM) in the OBI DCS segments are used as the initial information. It was shown that the automation of ISA procedures based on the use of BN and ANN allows the DCN IS administrator to respond dynamically to threats in a real time manner, to promptly select effective countermeasures to protect the DCS.

Cite

CITATION STYLE

APA

Akhmetov, B., Lakhno, V., Chubaievskyi, V., Kaminskyi, S., Adilzhanova, S., & Ydyryshbayeva, M. (2022). Automation of Information Security Risk Assessment. International Journal of Electronics and Telecommunications, 68(3), 549–555. https://doi.org/10.24425/ijet.2022.141273

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free