Abstract

Use of the Utility Tree Technique in Process of Treats Analysis for Information Security in Information and Communication Systems This paper describes a technique of utility tree, which can be used in process of risk analysis for information security in information and communication systems. The technique uses connections between vulnerabilities of a system's element, a frequency of an event incidence (which exploits the vulnerability) and its the importance of such events for information security. It also describes and evaluates the influence of an event on information and communication system. The technique uses a qualitative risks assessment, which makes it simple in use.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call