RISK MANAGEMENT OF UNAUTHORIZED ACCESS TO COMPUTER INFORMATION DISTRIBUTED BY AUTOMATED SYSTEMS DEVELOPMENT PROJECTS OF INNOVATION
Journal: Synergy of Science (Vol.8, No. 1)Publication Date: 2017-02-28
Authors : Ivanov P.A.; Mytnikov A.N.;
Page : 0-0
Keywords : risk; distributed automation system; computer crime; the algorithm; information security.;
Abstract
The article describes an algorithm for the integral management of the risk of unauthorized access to computer information in a range of damage, while maintaining its non-uniformity and the optimal value of the damage range by adjusting the parameters of position and scale.
Other Latest Articles
- English Engagement Markers: A Comparison of Humanities and Science Journal Articles
- The Models of Arabized and Entered of Pahlavi and Contemporary Persian
- Constituent Order in Minimalist Syntax, Universals and Parameters. (VP-Specifier and VP-Complement Order)
- The Roles of Age and Gender in Applying Proverbs and Expressions in Daily Conversations of Shirazians
- Indication and Symbolic Language in Araesol-Bayan of Rouzbehan Baqli: Interpretation or Paraphrase?
Last modified: 2017-02-16 03:25:45