Ranking Threats to Determine the Cost of Protecting Information in a Cybersecurity Environment

The main purpose of the study is to rank certain threats in order to establish further costs for ensuring the protecting of information in the cybersecurity system. Research methodology is a set of methods that form a methodological approach. The main ones are the ranking method through the theory o...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Ingénierie des systèmes d'Information 2023-02, Vol.28 (1), p.77-84
Hauptverfasser: Yemanov, Vladislav, Pasichnyk, Vasyl, Yevtushenko, Ihor, Larin, Stanislav, Mykhailenko, Olena
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 84
container_issue 1
container_start_page 77
container_title Ingénierie des systèmes d'Information
container_volume 28
creator Yemanov, Vladislav
Pasichnyk, Vasyl
Yevtushenko, Ihor
Larin, Stanislav
Mykhailenko, Olena
description The main purpose of the study is to rank certain threats in order to establish further costs for ensuring the protecting of information in the cybersecurity system. Research methodology is a set of methods that form a methodological approach. The main ones are the ranking method through the theory of fuzzy relations and the expert-step method. As a result, due to the ranking of the threats of the selected object, the permissible intensity of the decrease in the level of security and the costs of its provision were determined using the proposed methodology. The results obtained implied the use of modern ranking methods according to the given parameters. In our case, the results obtained allowed us to rank the existing list of threats in the cybersecurity system. The benefit of such results lies in the formation of an information basis for the adoption and implementation of management decisions.The study is limited by selecting only one socio-economic system and its information. The results obtained out in the article have practical and scientific value through a methodical approach to form requirements for the security of the cybersecurity system itself and information of a single object. In the future, more complex socio-economic systems and their cybersecurity should be chosen to apply the methodological approach proposed in the article.
doi_str_mv 10.18280/isi.280108
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2803914595</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2803914595</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1718-106bf285624ae5757b48dd20f443ac2f061f2e3513ddf509ffad7f55be3169213</originalsourceid><addsrcrecordid>eNotkE1LAzEURYMoWGpX_oGAS5mal0zmYylj1UJBkbo1ZGZebKqT1CQV-u8drXdzN4f3uIeQS2BzqHjFbmy087GBVSdkwgGKrAQuT8kECiEyEADnZBbjlo0RAoqcTcjbi3Yf1r3T9SagTpEmT-8wYRisQ5o2SBsfE_WGPgefsEu_7NIZHwadrHfUOqppc2gxROz2waYDXbhvG7wb0KULcmb0Z8TZf0_J6_1i3Txmq6eHZXO7yjooocqAFa3hlSx4rlGWsmzzqu85M3kudMcNK8BwFBJE3xvJamN0XxopWxxn1BzElFwd7-6C_9pjTGrr98GNL9VoRNSQy1qO1PWR6oKPMaBRu2AHHQ4KmPpzqEaH6uhQ_ACHFGQa</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2803914595</pqid></control><display><type>article</type><title>Ranking Threats to Determine the Cost of Protecting Information in a Cybersecurity Environment</title><source>EZB Electronic Journals Library</source><creator>Yemanov, Vladislav ; Pasichnyk, Vasyl ; Yevtushenko, Ihor ; Larin, Stanislav ; Mykhailenko, Olena</creator><creatorcontrib>Yemanov, Vladislav ; Pasichnyk, Vasyl ; Yevtushenko, Ihor ; Larin, Stanislav ; Mykhailenko, Olena</creatorcontrib><description>The main purpose of the study is to rank certain threats in order to establish further costs for ensuring the protecting of information in the cybersecurity system. Research methodology is a set of methods that form a methodological approach. The main ones are the ranking method through the theory of fuzzy relations and the expert-step method. As a result, due to the ranking of the threats of the selected object, the permissible intensity of the decrease in the level of security and the costs of its provision were determined using the proposed methodology. The results obtained implied the use of modern ranking methods according to the given parameters. In our case, the results obtained allowed us to rank the existing list of threats in the cybersecurity system. The benefit of such results lies in the formation of an information basis for the adoption and implementation of management decisions.The study is limited by selecting only one socio-economic system and its information. The results obtained out in the article have practical and scientific value through a methodical approach to form requirements for the security of the cybersecurity system itself and information of a single object. In the future, more complex socio-economic systems and their cybersecurity should be chosen to apply the methodological approach proposed in the article.</description><identifier>ISSN: 1633-1311</identifier><identifier>EISSN: 2116-7125</identifier><identifier>DOI: 10.18280/isi.280108</identifier><language>eng</language><publisher>Edmonton: International Information and Engineering Technology Association (IIETA)</publisher><subject>Confidentiality ; Costs ; Cybersecurity ; Espionage ; Methods ; Ranking ; Security systems ; Software ; Threats</subject><ispartof>Ingénierie des systèmes d'Information, 2023-02, Vol.28 (1), p.77-84</ispartof><rights>2023. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Yemanov, Vladislav</creatorcontrib><creatorcontrib>Pasichnyk, Vasyl</creatorcontrib><creatorcontrib>Yevtushenko, Ihor</creatorcontrib><creatorcontrib>Larin, Stanislav</creatorcontrib><creatorcontrib>Mykhailenko, Olena</creatorcontrib><title>Ranking Threats to Determine the Cost of Protecting Information in a Cybersecurity Environment</title><title>Ingénierie des systèmes d'Information</title><description>The main purpose of the study is to rank certain threats in order to establish further costs for ensuring the protecting of information in the cybersecurity system. Research methodology is a set of methods that form a methodological approach. The main ones are the ranking method through the theory of fuzzy relations and the expert-step method. As a result, due to the ranking of the threats of the selected object, the permissible intensity of the decrease in the level of security and the costs of its provision were determined using the proposed methodology. The results obtained implied the use of modern ranking methods according to the given parameters. In our case, the results obtained allowed us to rank the existing list of threats in the cybersecurity system. The benefit of such results lies in the formation of an information basis for the adoption and implementation of management decisions.The study is limited by selecting only one socio-economic system and its information. The results obtained out in the article have practical and scientific value through a methodical approach to form requirements for the security of the cybersecurity system itself and information of a single object. In the future, more complex socio-economic systems and their cybersecurity should be chosen to apply the methodological approach proposed in the article.</description><subject>Confidentiality</subject><subject>Costs</subject><subject>Cybersecurity</subject><subject>Espionage</subject><subject>Methods</subject><subject>Ranking</subject><subject>Security systems</subject><subject>Software</subject><subject>Threats</subject><issn>1633-1311</issn><issn>2116-7125</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNotkE1LAzEURYMoWGpX_oGAS5mal0zmYylj1UJBkbo1ZGZebKqT1CQV-u8drXdzN4f3uIeQS2BzqHjFbmy087GBVSdkwgGKrAQuT8kECiEyEADnZBbjlo0RAoqcTcjbi3Yf1r3T9SagTpEmT-8wYRisQ5o2SBsfE_WGPgefsEu_7NIZHwadrHfUOqppc2gxROz2waYDXbhvG7wb0KULcmb0Z8TZf0_J6_1i3Txmq6eHZXO7yjooocqAFa3hlSx4rlGWsmzzqu85M3kudMcNK8BwFBJE3xvJamN0XxopWxxn1BzElFwd7-6C_9pjTGrr98GNL9VoRNSQy1qO1PWR6oKPMaBRu2AHHQ4KmPpzqEaH6uhQ_ACHFGQa</recordid><startdate>20230201</startdate><enddate>20230201</enddate><creator>Yemanov, Vladislav</creator><creator>Pasichnyk, Vasyl</creator><creator>Yevtushenko, Ihor</creator><creator>Larin, Stanislav</creator><creator>Mykhailenko, Olena</creator><general>International Information and Engineering Technology Association (IIETA)</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>AFKRA</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PQBIZ</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20230201</creationdate><title>Ranking Threats to Determine the Cost of Protecting Information in a Cybersecurity Environment</title><author>Yemanov, Vladislav ; Pasichnyk, Vasyl ; Yevtushenko, Ihor ; Larin, Stanislav ; Mykhailenko, Olena</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1718-106bf285624ae5757b48dd20f443ac2f061f2e3513ddf509ffad7f55be3169213</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Confidentiality</topic><topic>Costs</topic><topic>Cybersecurity</topic><topic>Espionage</topic><topic>Methods</topic><topic>Ranking</topic><topic>Security systems</topic><topic>Software</topic><topic>Threats</topic><toplevel>online_resources</toplevel><creatorcontrib>Yemanov, Vladislav</creatorcontrib><creatorcontrib>Pasichnyk, Vasyl</creatorcontrib><creatorcontrib>Yevtushenko, Ihor</creatorcontrib><creatorcontrib>Larin, Stanislav</creatorcontrib><creatorcontrib>Mykhailenko, Olena</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Database (Proquest)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>ProQuest Engineering Database</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><jtitle>Ingénierie des systèmes d'Information</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yemanov, Vladislav</au><au>Pasichnyk, Vasyl</au><au>Yevtushenko, Ihor</au><au>Larin, Stanislav</au><au>Mykhailenko, Olena</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Ranking Threats to Determine the Cost of Protecting Information in a Cybersecurity Environment</atitle><jtitle>Ingénierie des systèmes d'Information</jtitle><date>2023-02-01</date><risdate>2023</risdate><volume>28</volume><issue>1</issue><spage>77</spage><epage>84</epage><pages>77-84</pages><issn>1633-1311</issn><eissn>2116-7125</eissn><abstract>The main purpose of the study is to rank certain threats in order to establish further costs for ensuring the protecting of information in the cybersecurity system. Research methodology is a set of methods that form a methodological approach. The main ones are the ranking method through the theory of fuzzy relations and the expert-step method. As a result, due to the ranking of the threats of the selected object, the permissible intensity of the decrease in the level of security and the costs of its provision were determined using the proposed methodology. The results obtained implied the use of modern ranking methods according to the given parameters. In our case, the results obtained allowed us to rank the existing list of threats in the cybersecurity system. The benefit of such results lies in the formation of an information basis for the adoption and implementation of management decisions.The study is limited by selecting only one socio-economic system and its information. The results obtained out in the article have practical and scientific value through a methodical approach to form requirements for the security of the cybersecurity system itself and information of a single object. In the future, more complex socio-economic systems and their cybersecurity should be chosen to apply the methodological approach proposed in the article.</abstract><cop>Edmonton</cop><pub>International Information and Engineering Technology Association (IIETA)</pub><doi>10.18280/isi.280108</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1633-1311
ispartof Ingénierie des systèmes d'Information, 2023-02, Vol.28 (1), p.77-84
issn 1633-1311
2116-7125
language eng
recordid cdi_proquest_journals_2803914595
source EZB Electronic Journals Library
subjects Confidentiality
Costs
Cybersecurity
Espionage
Methods
Ranking
Security systems
Software
Threats
title Ranking Threats to Determine the Cost of Protecting Information in a Cybersecurity Environment
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T11%3A03%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Ranking%20Threats%20to%20Determine%20the%20Cost%20of%20Protecting%20Information%20in%20a%20Cybersecurity%20Environment&rft.jtitle=Ing%C3%A9nierie%20des%20syst%C3%A8mes%20d'Information&rft.au=Yemanov,%20Vladislav&rft.date=2023-02-01&rft.volume=28&rft.issue=1&rft.spage=77&rft.epage=84&rft.pages=77-84&rft.issn=1633-1311&rft.eissn=2116-7125&rft_id=info:doi/10.18280/isi.280108&rft_dat=%3Cproquest_cross%3E2803914595%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2803914595&rft_id=info:pmid/&rfr_iscdi=true