Abstract

In the paper, a study of the task of predicting information security vulnerabilities is carried out based on the analysis of the data of thematic Internet resources. Against the backdrop of the rapid development of information technology, there has been an increase in the activity of a variety of computer attacks carried out and planned using modern latest technologies. Harmful information has become an obvious problem in the information security of society today, it should also be noted that criminal and terrorist groups are increasingly adopting means of information influence, developing and writing strategies aimed at attracting new adherents and expanding the sphere of influence through social networks. The analysis of the conducted research of the current state in the field of information security shows that the pace of development of information and computer technologies is significantly ahead of the process of creating software and hardware in the field of information security. The priority in this situation is the task of analysis, classification, identification of active mechanisms and means of attacks and threats to the information security of the system, which can lead to unauthorized access to confidential data, disruption of the functioning of the information system, determination of countermeasures against attacks and threats, assessment of the given damage, development of the legal framework, protection mechanisms and information security criteria of the countermeasure system. Today, there is no single approach to solving the problem of security of information and search systems, in relation to subject areas: developers of hardware and software protection of information offer appropriate components for solving specific problems; ensuring reliable protection of information resources requires the implementation of appropriate technical and organizational measures in a complex, accompanied by the development of appropriate documentation. Most of the modern software and hardware systems for detecting computer threats and attacks work using the approaches of signature analysis and fixing of Internet network anomalies. These approaches have disadvantages associated with the use of powerful computing resources for their implementation, and have low efficiency when detecting new computer threats. The method of predicting information security vulnerabilities based on data from Internet resources, based on fuzzy inference, semantic and statistical analysis, is distinguished by the ability to identify vulnerabilities and threats to their implementation, allows you to describe the patterns of the information process of filling thematic resources with new text messages, which affects the quality of forecasting . The algorithm for forecasting vulnerabilities and threats to information security implemented in the information and analytical system, based on the analysis of the data flow of thematic resources, allows automating the information process of detecting new vulnerabilities and threats, provides information security specialists with the opportunity to assess the degree of security of resources in a timely manner and, if necessary, take appropriate measures to neutralize possible threats and vulnerabilities, thereby increasing the information security of computing computer systems against the implementation of new network computer attacks.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call