System construction of cybersecurity vulnerabilities with Q-analysis
dc.contributor.author | Polutsyganova, V. I. | |
dc.date.accessioned | 2023-11-22T09:35:40Z | |
dc.date.available | 2023-11-22T09:35:40Z | |
dc.date.issued | 2023 | |
dc.description.abstract | Today, in order to assess potential cyber threats, it is necessary to conduct a comprehensive assessment of the vulnerabilities of the investigated system. To do this, it is necessary to describe the identified vulnerabilities and consider potential vulnerabilities. In addition, the relationship between system vulnerabilities must be properly assessed. The most common assumption is that all vulnerabilities are independent and are implemented either by random events or by malicious intent. The paper proposes a method that allows modeling the vulnerabilities of complex systems as a whole, taking into account their hidden connections. Q-analysis [2] was used to study the structure of the system of interconnected vulnerabilities that arise in the process of project implementation. An example of the application of Q-analysis methods is presented and an explanation of the nature and impact of some potential threats and their combinations is offered. | uk |
dc.format.pagerange | Pp. 51-55 | uk |
dc.identifier.citation | Polutsyganova, V. System construction of cybersecurity vulnerabilities with Q-analysis / V. I. Polutsyganova // Theoretical and Applied Cybersecurity : scientific journal. – 2023. – Vol. 5, Iss. 1. – Pp. 51–55. – Bibliogr. 7 ref. | uk |
dc.identifier.doi | https://doi.org/10.20535/tacs.2664-29132023.1.285430 | |
dc.identifier.orcid | 0000-0002-9729-5786 | uk |
dc.identifier.uri | https://ela.kpi.ua/handle/123456789/62361 | |
dc.language.iso | en | uk |
dc.publisher | Igor Sikorsky Kyiv Polytechnic Institute | uk |
dc.publisher.place | Kyiv | uk |
dc.relation.ispartof | Theoretical and Applied Cybersecurity: scientific journal, Vol. 5, No. 1 | uk |
dc.subject | Q-analysis | uk |
dc.subject | simplicial complex | uk |
dc.subject | cyber systems | uk |
dc.subject | vulnerabilities | uk |
dc.subject.udc | 519.715 | uk |
dc.title | System construction of cybersecurity vulnerabilities with Q-analysis | uk |
dc.type | Article | uk |
Файли
Контейнер файлів
1 - 1 з 1
Вантажиться...
- Назва:
- 285430-664097-1-10-20230919.pdf
- Розмір:
- 669.46 KB
- Формат:
- Adobe Portable Document Format
- Опис:
Ліцензійна угода
1 - 1 з 1
Ескіз недоступний
- Назва:
- license.txt
- Розмір:
- 1.71 KB
- Формат:
- Item-specific license agreed upon to submission
- Опис: