Abstract

The risk of information security as an influence of uncertainty on the achievement of goals is considered. In achieving the goals meant to ensure the confidentiality, integrity and availability of information. Estimation of such influence is carried out by the elimination of entropy as a measure of uncertainty. The state of uncertainty is described by the final scheme. The variety of threats for information security and loss resulting from their implementation is set for its definition. It takes into account the existence of different threats that lead to the same losses, and threats, due to the implementation of which there are no losses. At the same time, the distribution of likelihood of damage as a result of the implementation of threats for information security is considered as known. The correctness of that approach is confirmed by the implementation of the entropy characteristics. Therefore, the use of an entropy approach allows to construct an intuitively more correct basis for quantitative risk assessment of information security. It is associated with a fact of operating the form of the distribution of a random variable but not its specific values. In this case, the advantages and disadvantages of the entropy approach are established. The using of fuzzy set theory and likelihood is offered to overcome the identified shortcomings in prospect.

Highlights

  • ВеличинаH A ( p1, p2 ,.., pi ,.., pm ) 0.

  • Цим пояснюється відмінність ризиків безпеки від комерційних ризиків, де може існувати від’ємний ризик, що еквівалентний доходу на противагу збиткам при позитивному ризику

  • Якщо кінцеві схеми двох об’єктів A і ВЯкщо два об’єкта A і В мають однакові розподіли ймовірностей нанесення збитку внаслідок реалізації загроз, то ризик безпеки інформації для таких об’єктів однаковий

Read more

Summary

Величина

H A ( p1, p2 ,.., pi ,.., pm ) 0. Цим пояснюється відмінність ризиків безпеки від комерційних ризиків, де може існувати від’ємний ризик, що еквівалентний доходу на противагу збиткам при позитивному ризику

Якщо кінцеві схеми двох об’єктів A і В
Якщо p1
Якщо кінцева схема об’єкта A доповнюється неможливою подією
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.