Author:Igor Mandritsa

Publications
EasyChair Preprint no. 7251
EasyChair Preprint no. 7050
EasyChair Preprint no. 6695
EasyChair Preprint no. 6083
EasyChair Preprint no. 5894

Keyphrases

API requests, business process2, Business process stages and their cost of protection from internal threats, Business task, Choosing an information security strategy, Criteria - objectives of the mathematical model., Criteria for evaluating information security costs, cyber information, cyber information protection, Cybersecurity, cybersecurity strategy, Defense or cyber information., economic damage, Economics of cybersecurity., Factors of the mathematical model of the information cybersecurity of an organization., Factors of the model., Information Security2, information security risk, information threat, Internal threat, Mathematical model of the information cybersecurity of the organization., organization business process, Plan, Privacy risk assessment and assurance, Rational cost of business process information protection, Risks of internal leakage, Strategic plan of the information cybersecurity of the organization., strategic planning, Strategic planning of the information cybersecurity of an organization., Strategy, The cost of protecting information., threat model, Transport economy task as the task of optimal programming of cybersecurity., Typology of cybersecurity internal threats.