Abstract

The article provides a comparative analysis of the practical use of expert assessments in an innovative environment of the optimization of the information security process in the digital educational environment of internal affairs agencies, namely, the correspondence of the interviewed experts’ assessments and of the research data. To process expert opinions on the threat probability, during comparative analysis we will use expert assessment methods. These methods are mainly intended for solving unstructured problems when the representation in mathematical form is difficult or impossible. Data provided by the experts is processed by a given mathematical method. Within the framework of this publication, we determine the most dangerous attack vectors by use of expert assessment methods. In order to determine the risk of information security threats implementation and, as a consequence, the occurrence of a damage in the information systems of internal affairs agencies, we will consider the possibility to determine the probability of the usage of given attack vectors by the experts. When resolving this issue, the definition of IS should be supplemented with the word “technological” in connection with the importance of large distributed technological systems supporting the operation of internal affairs agencies information technological systems.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call