Polutsyganova, V. I.2023-11-222023-11-222023Polutsyganova, V. System construction of cybersecurity vulnerabilities with Q-analysis / V. I. Polutsyganova // Theoretical and Applied Cybersecurity : scientific journal. – 2023. – Vol. 5, Iss. 1. – Pp. 51–55. – Bibliogr. 7 ref.https://ela.kpi.ua/handle/123456789/62361Today, in order to assess potential cyber threats, it is necessary to conduct a comprehensive assessment of the vulnerabilities of the investigated system. To do this, it is necessary to describe the identified vulnerabilities and consider potential vulnerabilities. In addition, the relationship between system vulnerabilities must be properly assessed. The most common assumption is that all vulnerabilities are independent and are implemented either by random events or by malicious intent. The paper proposes a method that allows modeling the vulnerabilities of complex systems as a whole, taking into account their hidden connections. Q-analysis [2] was used to study the structure of the system of interconnected vulnerabilities that arise in the process of project implementation. An example of the application of Q-analysis methods is presented and an explanation of the nature and impact of some potential threats and their combinations is offered.enQ-analysissimplicial complexcyber systemsvulnerabilitiesSystem construction of cybersecurity vulnerabilities with Q-analysisArticlePp. 51-55https://doi.org/10.20535/tacs.2664-29132023.1.285430519.7150000-0002-9729-5786