Please use this identifier to cite or link to this item:
https://er.nau.edu.ua/handle/NAU/50999
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Marchenko, Maksym | - |
dc.date.accessioned | 2021-06-04T09:46:26Z | - |
dc.date.available | 2021-06-04T09:46:26Z | - |
dc.date.issued | 2021-04 | - |
dc.identifier.citation | Marchenko M.V. Understanding and analysis of cyber threats // Polit. Callanges of science today. International relations : abstracts of XXI International conference of higher education students and young scientists. – National Aviation University. – Kyiv, 2021. – 51-52 p. | uk_UA |
dc.identifier.uri | https://er.nau.edu.ua/handle/NAU/50999 | - |
dc.description | 1.Apple Inc. Risk Assessment and Threat Modeling. Retrieved on 07/08/2014 from https://developer.apple.com/library/ios/documentation/Security/Conceptual/Security_Overview/ ThreatModeling/ThreatModeling.html 2.Cyber Squared Inc. Cyber Threat Analysis, not just for the Military. Retrieved on 07/08/2014 from http://www.cybersquared.com/2012/02/cyber-threat-analysis-not-just-for-themilitary/ 3.Goel, S. & Chen, V. (2005). Information Security Risk Analysis – A Matrix-based Approach. Retrieved on 07/08/2014 from http://www.albany.edu/~GOEL/publications/goelchen2005.pdf 4.Hughe, J. & Cybenko, G. (2013). Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity. Retrieved on 07/08/2014 from http://timreview.ca/article/712 5.Hulme, G. (2014). CSOs need to more precisely understand the actual threats facing their organization. The fix? Threat modeling. Retrieved on 07/08/2014 from http://www.csoonline.com/article/2134353/strategic-planning-erm/can-threat-modeling-keepsecurity-a-step-ahead-of-the-risks-.html 6.Mateski, M., Trevino, C., Veitch, C., Michalski, J., Harris, J., Maruoka, S., Frye, J. (2012). Cyber Threat Metrics. Retrieved on 07/08/2014 from http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-065.pdf 7.Microsoft. Threat Modeling Principles. Retrieved on 07/08/2014 from http://msdn.microsoft.com/en-us/library/ff648644.aspx 8.MSM. Cyber Intelligence Threat Analysis. Retrieved on 07/08/2014 from http://measurablesecurity.mitre.org/directory/areas/threatanalysis.html 9.Richards, K. (2014). RSA 2014: HP exec says security threat analysis should guide strategy. | uk_UA |
dc.description.abstract | A threat could be anything that leads to interruption, meddling or destruction of any valuable service or item existing in the firm’s repertoire. Whether of “human” or “nonhuman” origin, the analysis must scrutinize each element that may bring about conceivable security risk. Cyber threat analysis is a process in which the knowledge of internal and external information vulnerabilities pertinent to a particular organization is matched against real-world cyber attacks. | uk_UA |
dc.description.abstract | Загрозою може бути все, що призводить до переривання, втручання або знищення будь-якої цінної послуги чи предмета, що існує в репертуарі фірми. Незалежно від того, чи є вони «людським» чи «нелюдським», аналіз повинен ретельно вивчити кожен елемент, який може спричинити можливий ризик безпеки. Аналіз кіберзагроз - це процес, у якому знання про внутрішні та зовнішні інформаційні вразливості, що стосуються певної організації, поєднуються із реальними кібератаками. | uk_UA |
dc.language.iso | en | uk_UA |
dc.publisher | National Aviation University | uk_UA |
dc.subject | cyber threat | uk_UA |
dc.subject | кіберзагроза | uk_UA |
dc.subject | mitigation and anticipation | uk_UA |
dc.subject | пом'якшення та очікування | uk_UA |
dc.subject | vulnerability analysis | uk_UA |
dc.subject | аналіз вразливості | uk_UA |
dc.title | Understanding and analysis of cyber threats | uk_UA |
dc.title.alternative | Розуміння та аналіз кіберзагроз | uk_UA |
dc.type | Thesis | uk_UA |
dc.subject.udc | 004 | uk_UA |
Appears in Collections: | Політ. Modern information and communication technologies in aviation. 2021 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Марченко_М_В - Максим Віталійович Марченко.pdf | тези конференції | 47.77 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.