Model of Threats to the Integrity and Availability of Information Processed in Cyberspace
Depending on their motivation, offenders have different goals, and disclosure of information is not always such a goal. It often happens that the purpose of the offender is to disrupt the normal operation of the system. This can be achieved both by acting directly on the information and by acting on...
Main Authors: | Nikolay Sergeevich Egoshin, Anton Aleksandrovich Konev, Aleksandr Aleksandrovich Shelupanov |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-02-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-8994/15/2/431 |
Similar Items
-
A Model of Threats to the Confidentiality of Information Processed in Cyberspace Based on the Information Flows Model
by: Egoshin N. S., et al.
Published: (2020-11-01) -
Building a model of infringer
by: Nikolay S Egoshin, et al.
Published: (2017-11-01) -
A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats
by: Anton Konev, et al.
Published: (2022-03-01) -
Review on Confidentiality, Integrity and Availability in Information Security
by: Chai Kar Yee, et al.
Published: (2021-07-01) -
Linear dynamic model of threats to information security
by: Aleksandr L. Gorbylev, et al.
Published: (2018-09-01)