ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Protection of data from malicious threats in the protection system

Journal: Science and Education (Vol.3, No. 11)

Publication Date:

Authors : ;

Page : 413-421

Keywords : DBMS; information security; complex security; protection system; threat; risk;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The disadvantages and advantages of the risk measurement methods used in the integrated protection system will be highlighted, recommendations and classification of potential intruders when creating a security mechanism in the organization will be given. One of the techniques for analyzing systemic protections will be the creation of a dynamic movement of a complex system, in addition to which it will be considered what needs to be taken into account when assessing risks and what parameters to calculate. Particular attention will be paid to the creation of methods and technologies for creating software for detecting and reducing risks based on motion maps.

Last modified: 2022-12-08 01:57:58