In order to distinguish KVIN from other information and categorize it correctly, believes Alexey Dankov, Head of the Information Security Department at Cross Technologies, it is necessary to define and use regulatory requirements for categorizing information taking into account the processes of its processing and the specifics of the functioning of the enterprise itself, organize an expert assessment of information security risks in relation to information assets with the involvement of business process owners and identify various levels of information criticality from low to high using appropriate risk management tools for each such level.
According to Denis Sukhovey, a number of analysis methods are currently used to determine the possible damage from the implementation of COVID-19 threats: a full-scale experiment, mathematical modeling, and expert methods. “The essence of a full-scale experiment is to prepare a full-fledged copy of a real protected object, taking into account the relationships between the components of the object and other objects of a certain system. The resulting model allows simulating possible actions of belize mobile database who gain unauthorized access to the protected object. The modeling results are statistically processed, and practical recommendations for ensuring information security are developed based on this information. As for mathematical modeling.
this is the process of determining the compliance of a real protected object with a certain mathematical model. The model is then subjected to analysis of possible actions of an intruder to change its various characteristics. And finally, the expert method involves interviewing specialists and information owners with the subsequent creation of an information base to be analyzed. During the analysis, certain economic indicators of the protected object are taken as a basis. Then, the specialists express their opinion on the relative decrease in these indicators as a result of the expected implementation of COVID-19 threats. “The final conclusions are determined on the basis of average values,” he explained.
Methods and tools for assessing possible damage from the implementation of COVID-19 threats
-
- Posts: 540
- Joined: Mon Dec 23, 2024 3:15 am