Strategic Priorities of the Enterprise Information Security System, Attracts a Freelance Resource
DOI: 10.31673/2409-7292.2019.033035
DOI:
https://doi.org/10.31673/2409-7292.2019.033035Abstract
The research focus is on the strategic priorities of the enterprise information security system, which attracts a freelance resource and on the study of the enterprise cybersecurity system in the context of risk management analysis of the enterprise with determination of its successive stages. The model of determination of the recommended frequency for the process of cyber risk management at the enterprise is proposed, the basic principles, key issues, approaches to the effective implementation of this model in the modern conditions of enterprise activity are determined. The mathematical model is based on the decomposition of a piecewise continuous analytic approximation function into a Fourier series, which makes it possible to move the enterprise cyber-threat audit system from a discrete to a continuous automated audit process.
Keywords: freelance resource, business processes, communication channels, social engineering, express audit, Fourier series.
References
1. Барабаш О.В. Построение функционально устойчивых распределенных информационных систем: монография. К.: НАОУ, 2004. 224 с.
2. Lange M., Kuhr F. and Möller R. "Using a Deep Understanding of Network Activities for Network Vulnerability Assessment," in Proceedings of the 1st International Workshop on AI for Privacy and Security, 2016.
3. Котенко И.В., Саенко И.Б., Коцыняк М.А., Лаута О.С. Оценка киберустойчивости компьютерных сетей на основе моделирования кибератак методом преобразования стохастических сетей. Тр. СПИИРАН, 2017, выпуск 55, 160 – 184.
4. Авсентьев О.С., Дровникова И.Г., Застрожнов И.И., Попов А.Д., Рогозин Е.А. Методика управления защитой информационного ресурса системы электронного документооборота, Тр. СПИИРАН, 2018, выпуск 57, 188 – 210.
5. How to perform a cyber risk assessment. [Електронний ресурс] // Режим доступу: https://www.thesslstore.com/blog/cyber-risk-assessment/ (Дата звернення 12.06.2019).