THE EFFICIENCY ESTIMATION OF THE INTRUDER ATTACKS IN THE PROCESS OF HIS MODEL CREATION

A. . Spivak


Read the full article 

Abstract

 

The design of the security information system always has the stage of the intruder model creation. A well known approach is the usage of violator characteristics as the basis for estimation of his influence on the security system. The changing of the protected object behavior can be used for the estimation of the security violator actions.

Keywords: model, security, intruder, estimation, information
Copyright 2001-2017 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика