security audit
Recently Published Documents


TOTAL DOCUMENTS

186
(FIVE YEARS 59)

H-INDEX

5
(FIVE YEARS 1)

Author(s):  
Razvan Nitu ◽  
Eduard Staniloiu ◽  
Cristian Done ◽  
Razvan Rughinis

2021 ◽  
Vol 2099 (1) ◽  
pp. 012069
Author(s):  
V A Voevodin ◽  
D S Burenok ◽  
V S Cherniaev

Abstract The application of the Monte Carlo method to solving the problem of identifying and assessing the protection against DDoS attacks of weak nodes is considered. The field of research is of practical and theoretical interest, since the methods developed by the classical theory of reliability are focused on simple, stationary flows. Under the conditions of DDoS attacks, the flow of attacking requests is not stationary, so the known analytical models give an unacceptable error. For the reliability of the results, the freedom to choose the distribution function, the moments of arrival of the attacking requests, their duration and the response of the attacked node is required. The method is applicable for modelling a computer network when organizing an information security audit.


2021 ◽  
Author(s):  
Hachol Dabthong ◽  
Maykin Warasart ◽  
Phongsaphat Duma ◽  
Pongpat Rakdej ◽  
Natt Majaroen ◽  
...  
Keyword(s):  
Low Cost ◽  

2021 ◽  
Vol 6 ◽  
pp. 268-275
Author(s):  
Anastasia V. Sitskaya ◽  
Valeria A. Tabakaeva ◽  
Valentin V. Selifanov

The modern world can be characterized by a huge amount of information and computerization of all spheres of human activity. But one of the most valuable information can be considered the information that concerns financial organizations. There are incidents of information security in financial organizations that can lead not only to the violation of the interests of an individual client, but also to the crisis of the financial market of the entire country. Information security audit allows you to detect violations in the organization's information system in a timely manner, which significantly increases the security of information. Often, timely and rapid receipt of a qualitative and quantitative assessment of the level of security allows you to avoid an incident. To improve the accuracy of estimates and reduce the time of their receipt, the application "Audit57580" was developed, the relevance of which is discussed in detail in the article.


Sign in / Sign up

Export Citation Format

Share Document