Безопасность информационных технологий (Jun 2011)
The Threats Model Construction by means of Fuzzy Cognitive Map on the basis of the Networks Security Policy
Abstract
The threats matrix construction on the basis of the access matrixes is discussed. Development of threats model on the basis of fuzzy cognitive maps displaying the threats spreading pathways from attack sources to objects is described.