ASSESSMENT OF THE PRECONDITIONS OF FORMATION OF THE METHODOLOGY OF ASSESSMENT OF INFORMATION RELIABILITY

Authors

DOI:

https://doi.org/10.28925/2663-4023.2022.15.164174

Keywords:

reliability of the information, information space, information resources, mass media

Abstract

The conceptual model of information reliability includes information resources, sources of information, factors of information confrontation, sources of factors of information confrontation (threats to authenticity), goals of attackers, functions, methods and means of ensuring reliability, and reliability indicators. The reliability of information (the degree of trust in data) contained in information resources is largely determined by the quality of sources and the ability of individuals to influence information processes. However, the concept of reliability of information is often associated with the categories of integrity and availability of information resources. All this must be ensured in the functioning of the information space in conditions of accidental or intentional informational influences. A necessary condition for achieving the required level of reliability of information is the construction of a comprehensive system for ensuring the reliability of the information. Information space of enterprises exists in the system of commodity-money relations, which is based on the concept of economic efficiency and can not afford to spend uncontrollably and unreasonably material resources for any activities. As a result, the assessment of the level of reliability of information and decision-making on measures to improve it raise the concomitant task of assessing the economic effect of their implementation.

Downloads

Download data is not yet available.

References

ISO/IEC 15408-2:2008 – Information technol-ogy – Security techniques – Evaluation criteria for IT security – Part 2: Security functional requirements. http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=46414

ISO/IEC 15408-3:2008 – Information technol-ogy – Security techniques – Evaluation criteria for IT security – Part 3: Security assurance requirements. http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=46413

Ostapenko, G.A., Parinova, L.V., Belonozhkin, V.I., Bataronov, I.L. (2013). Informatsionnyye riski v sotsial'nykh setyakh. Monografiya. OOO "Izdatel'stvo "Nauchnaya kniga".

Borzenkova, S.YU., Kazarina, Ye.Ye. (2020). Analiz metodov urovnya zashchishchennosti informatsionnykh sistem v protsesse ikh ekspluatatsii. Izvestiya TulGU. Tekhnicheskiye nauki, 5, 93-97.

Polyanskiy, D.A., Monakhov, M.YU. (2012). Model' otsenki faktorov izmeneniya dostovernosti informatsii v korporativnoy seti peredachi dannykh. Izv. VUZov. Priborostroyeniye, 55(8), 39-43.

Sergienko, I. V. (2012). Methods of Optimization and Systems Analysis for Problems of Transcomputational Complexity. Springer.

Behrendt, S., Richter, A., Trier, M. (2014). Mixed methods analysis of enterprise social networks. Computer Networks, 75, 560–577. https://doi.org/10.1016/j.comnet.2014.08.025

Venttsel', Ye.S. (2018). Teoriya veroyatnostey. Vysshaya shkola.

Semenova, I.I. (2014). Upravleniye protsessom obespecheniya dostovernosti informatsii v intellektual'nykh sistemakh podderzhki prinyatiya resheniy. Odinnadtsatyy Mezhdunarodnyy simpozium "Intellektual'nyye sistemy", 310-314

Ivanova, N.V., Korobulina, O.YU. (2011). Audit informatsionnoy bezopasnosti. Ucheb. Posobiye. PGUPS.

Butko, T., Prokhorchenko, A., Muzykin, M. (2016). An improved method of determining the schemes of locomotive circulation with regard to the technological peculiarities of railcar traffic. Eastern-European Journal of Enterprise Technologies, 5(3 (83)), 47–55. https://doi.org/10.15587/1729-4061.2016.80471

Downloads


Abstract views: 342

Published

2022-03-31

How to Cite

Brzhevska, Z., Kyrychok, R. ., Platonenko, A., & Hulak, H. (2022). ASSESSMENT OF THE PRECONDITIONS OF FORMATION OF THE METHODOLOGY OF ASSESSMENT OF INFORMATION RELIABILITY. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(15), 164–174. https://doi.org/10.28925/2663-4023.2022.15.164174

Most read articles by the same author(s)

1 2 > >>