IMPROVED MODEL OF ESTIMATING ECONOMIC EXPENDITURES ON THE INFORMATION PROTECTION SYSTEM IN SOCIAL NETWORKS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2021.12.1928

Keywords:

model, security, protection, social networks, economic resource, external influences

Abstract

In modern conditions, an important role in ensuring the information security of the enterprise and especially its economic component belongs to the processes of information security of the state as a whole. The key role in building security systems of information resources as components of national information resources of the state is played by theory and practice, in which the scientific and methodological basis is the basis for making sound and effective management decisions of the information security of the state at all levels. The article analyzes the approaches to estimating the assessment of economic costs for the information security system. The base model is selected. Using the basic model of assessing the level of protection of information in the social network from external influences on the information social resource, improvements were made to assess the economic feasibility of implementing a mechanism of technical means of information protection in social networks depending on the value of information. The improvement is based on the assumption that the amount of funds allocated by the attacking party is equal to the value of the information, the value of the information is the same for both parties, and the opposing parties are on equal terms. The main parameters on which the efficiency of the proposed model of estimating economic costs depends. The efficiency of the proposed model of estimating economic costs depends on the accuracy of formulating the probability of success of protection and determining the value of information. The prospect of further research and development may be aimed at taking into account in the model additional factors that affect the estimation of costs for the information security system, which will allow calculations to be performed with greater accuracy.

Downloads

Download data is not yet available.

References

Yevseiev S., Kots H., & Korol O. (2015). Analysis of the legal framework for the information security management system of the NSМEP. Eastern-European Journal of Enterprise Technologies, 5(3(77), 48–59. https://doi.org/10.15587/1729-4061.2015.51468

Yevseiev S., & Abdullayev V. (2015). Monitoring algorithm of two-factor authentication method based on рasswindow system. Eastern-European Journal of Enterprise Technologies, 2(2(74), 9–16. https://doi.org/10.15587/1729-4061.2015.38779

Yevseiev, S., Kots, H., & Liekariev, Y. (2016). Developing of multi-factor authentication method based on niederreiter-mceliece modified crypto-code system. Eastern-European Journal of Enterprise Technologies, 6(4 (84), 11–23. https://doi.org/10.15587/1729-4061.2016.86175

Yevseiev, S., Korol, O., & Kots, H. (2017). Construction of hybrid security systems based on the cryptocode structures and flawed codes. Eastern-European Journal of Enterprise Technologies, 4(9 (88), 4–21. https://doi.org/10.15587/1729-4061.2017.108461

Milov, O., Yevseiev, S., Ivanchenko, Y., Milevskyi, S., Nesterov, O., Puchkov, O., Salii, A., Timochko, O., Tiurin, V., & Yarovyi А. (2019). Development of the model of the antagonistic agents behavior under a cyber conflict. Eastern-European Journal of Enterprise Technologies, 4(9 (100), 6–19. https://doi.org/10.15587/1729-4061.2019.175978

Yevseiev, S., Tsyhanenko, O., Ivanchenko, S., Aleksiyev, V., Verheles, D., Volkov, S., Korolev, R., Kots, H., Milov, O., & Shmatko, O. (2018). Practical implementation of the Niederreiter modified cryptocode system on truncated elliptic codes. Eastern-European Journal of Enterprise Technologies, 6(4 (96), 24–31. https://doi.org/10.15587/1729-4061.2018.150903

Korchenko, O., Skachek, L., & Khoroshko, V. (2014). Banking Security. PVP “Zadruga.

Shiyan, A. (2016). Methodology of complex protection of people and social groups from negative information and psychological influence. Information security, 1(22), 94–98.

Korchenko, O., Kazmirchuk, S., & Ivanchenko, Е. (2017). The methodology for the synthesis of adaptive risk assessment systems of security information system resources. Ukrainian Information Security Research Journal, 19(3). https://doi.org/10.18372/2410-7840.19.11898

Yudin, О., & Buchyk, S. (2015). Methodology of Defence of State Informative Resources Comparative Analysis of BASIC Terms and Determinations. Ukrainian Information Security Research Journal, 17(3). https://doi.org/10.18372/2410-7840.17.9518

Zhurilenko, B. (2015). Construction and Analysis Methodology of Complex Technical Information Security with Probabilistic Reliability and Counting of Temporal Breaking attempts. Ukrainian Information Security Research Journal, 17(3). https://doi.org/10.18372/2410-7840.17.9515

Yevseiev, S., Laptiev, O., Lazarenko, S., Korchenko, A., & Manzhul, I. (2021). Modeling the Protection of Personal Data from Trust and the Amount of Information on Social Networks. EUREKA: Physics and Engineering, (1), 24-31. https://doi.org/10.21303/2461-4262.2021.001615

Laptiev O., Savchenko V., Kotenko A., Akhramovych V., Samosyuk V., Shuklin G., & Biehun A. (2021). Method of Determining Trust and Protection of Personal Data in Social Networks. International Journal of Communication Networks and Information Security (IJCNIS), Vol. 13, No. 1, рр.1-14

Downloads


Abstract views: 367

Published

2021-06-24

How to Cite

Laptiev, O., Sobchuk, V., Sobchuk, A., Laptiev, S., & Laptieva, T. (2021). IMPROVED MODEL OF ESTIMATING ECONOMIC EXPENDITURES ON THE INFORMATION PROTECTION SYSTEM IN SOCIAL NETWORKS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(12), 19–28. https://doi.org/10.28925/2663-4023.2021.12.1928

Most read articles by the same author(s)