{"id":1217,"date":"2021-01-15T22:22:24","date_gmt":"2021-01-15T20:22:24","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=1217"},"modified":"2021-03-04T11:35:04","modified_gmt":"2021-03-04T09:35:04","slug":"%d0%ba%d0%bb%d0%b0%d1%81%d0%b8%d1%84%d1%96%d0%ba%d0%b0%d1%86%d1%96%d1%8f-%d0%bc%d0%be%d0%b4%d0%b5%d0%bb%d0%b5%d0%b9-%d0%b7%d0%b0%d0%b3%d1%80%d0%be%d0%b7-%d0%b2-%d0%ba%d0%be%d0%bc%d0%bf%d1%8e","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=1217","title":{"rendered":"\u041a\u043b\u0430\u0441\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u044f \u043c\u043e\u0434\u0435\u043b\u0435\u0439 \u0437\u0430\u0433\u0440\u043e\u0437 \u0432 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445"},"content":{"rendered":"<p style=\"text-align: center;\">\u041a\u041b\u0410\u0421\u0418\u0424\u0406\u041a\u0410\u0426\u0406\u042f \u041c\u041e\u0414\u0415\u041b\u0415\u0419 \u0417\u0410\u0413\u0420\u041e\u0417 \u0412 \u041a\u041e\u041c\u041f\u2019\u042e\u0422\u0415\u0420\u041d\u0418\u0425 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425<\/p>\n<p style=\"text-align: center;\">CLASSIFICATION OF THREAT MODELS IN COMPUTER SYSTEMS<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/34-4.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 201-203. \u041d\u043e\u043c\u0435\u0440: \u21162, 2020 (283)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0412.\u042e. \u0422\u0406\u0422\u041e\u0412\u0410, \u042e.\u041f. \u041a\u041b\u042c\u041e\u0426, \u0421.\u041e. \u0421\u0410\u0412\u0427\u0423\u041a<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nVERA YURIIVNA TITOVA, YURII PAVLOVYCH KLOTS, SERHII OLEHOVYCH SAVCHUK<br \/>\nKhmelnytskyi National University<br \/>\n<strong>DOI:<\/strong> https:\/\/www.doi.org\/10.31891\/2307-5732-2020-283-2-201-203<br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 25.05.2020 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 16.06.2020 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412 \u0434\u0430\u043d\u0456\u0439 \u0441\u0442\u0430\u0442\u0442\u0456 \u0440\u043e\u0437\u0433\u043b\u044f\u043d\u0443\u0442\u043e \u0437\u0430\u0433\u0440\u043e\u0437\u0438 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u043c \u0434\u0430\u043d\u0438\u043c \u0443 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0442\u0430 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u043e \u043a\u043b\u0430\u0441\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u044e \u0437\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0445 \u0437\u0430\u0433\u0440\u043e\u0437 \u0447\u0435\u0440\u0435\u0437 \u0457\u0445 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a\u0438. \u0412\u0437\u0430\u0454\u043c\u043e\u0437\u0432\u2019\u044f\u0437\u043a\u0438 \u043c\u0456\u0436 \u043a\u043b\u0430\u0441\u0430\u043c\u0438 \u0437\u0430\u0433\u0440\u043e\u0437 \u0442\u0430 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a\u0430\u043c\u0438 \u0441\u0442\u0430\u043d\u043e\u0432\u043b\u044f\u0442\u044c \u043c\u0430\u0442\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u0443 \u043c\u043e\u0434\u0435\u043b\u044c \u0437\u0430\u0434\u0430\u0447\u0456 \u043a\u043b\u0430\u0441\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0437\u0430\u0433\u0440\u043e\u0437 \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u044e \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445, \u043d\u0430\u0432\u0435\u0434\u0435\u043d\u0443 \u0432 \u0434\u0430\u043d\u0456\u0439 \u0441\u0442\u0430\u0442\u0442\u0456. \u0410\u043d\u0430\u043b\u0456\u0437 \u043f\u043e\u0431\u0443\u0434\u043e\u0432\u0430\u043d\u043e\u0457 \u043c\u043e\u0434\u0435\u043b\u0456 \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u0454 \u0437\u0440\u043e\u0431\u0438\u0442\u0438 \u0432\u0438\u0441\u043d\u043e\u0432\u043a\u0438, \u0449\u043e \u0437\u0430\u0434\u0430\u0447\u0430 \u043a\u043b\u0430\u0441\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0437\u0430\u0433\u0440\u043e\u0437 \u043d\u0430\u043b\u0435\u0436\u0438\u0442\u044c \u0434\u043e \u0432\u0430\u0436\u043a\u043e \u0444\u043e\u0440\u043c\u0430\u043b\u0456\u0437\u043e\u0432\u0430\u043d\u0438\u0445 \u0437\u0430\u0434\u0430\u0447 \u0442\u0430 \u043f\u043e\u0442\u0440\u0435\u0431\u0443\u0454 \u0434\u043b\u044f \u0441\u0432\u043e\u0433\u043e \u0440\u043e\u0437\u0432\u2019\u044f\u0437\u0430\u043d\u043d\u044f \u043d\u0435 \u0442\u0440\u0430\u0434\u0438\u0446\u0456\u0439\u043d\u0438\u0445 \u043c\u0430\u0442\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u0438\u0445 \u043c\u0435\u0442\u043e\u0434\u0456\u0432, \u0430 \u043c\u0435\u0442\u043e\u0434\u0456\u0432 \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0456\u0437\u0443, \u043e\u0434\u043d\u0438\u043c \u0437 \u044f\u043a\u0438\u0445 \u043c\u043e\u0436\u0443\u0442\u044c \u0431\u0443\u0442\u0438 \u0434\u0438\u043d\u0430\u043c\u0456\u0447\u043d\u0456 \u0434\u0435\u0440\u0435\u0432\u0430 \u0440\u0456\u0448\u0435\u043d\u044c.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430: <\/strong>\u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0456 \u0437\u0430\u0433\u0440\u043e\u0437\u0438, \u043c\u0430\u0442\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u0430 \u043c\u043e\u0434\u0435\u043b\u044c, \u0437\u0430\u0445\u0438\u0441\u0442 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0456 \u0441\u0438\u0441\u0442\u0435\u043c\u0438.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The article proposes an approach to the classification of threats in modern computer systems, which consists in determining the classes of potential threats and the set of characteristics that define these classes. The study found that the same characteristic in different circumstances, in particular in combination with other characteristics, may determine the different class of threats. Moreover, it should be borne in mind that at one point in time there may be both one and several classes of threats, and the characteristics may change in the decision-making process. And with their change, one threat class can move to another or correlate with it. The relationships between threat classes and their characteristics constitute a mathematical model of the threat classification problem by the computer data protection system. From the analysis of the mathematical model of computer threats classification it is possible to draw conclusions that the following features are inherent to the this problem: there are a large number of possible solutions, which requires a significant amount of time to solve the problem by a complete search of all available options. In addition, the input data can change in the process of solving the problem, and when changing at least one value, you need to go through all the available options first; input data is difficult to represent in the form of numerical data, and therefore the solution of the problem cannot be reduced to numerical calculations. Thus, the task of classifying threats to computer data is a difficult task. It is impractical to use traditional mathematical methods to solve it. Therefore, based on the features of the above problem to solve it, it is advisable to use methods of intellectual analysis, in particular dynamic decision trees.<br \/>\n<strong>Keywords: <\/strong>computer threats, mathematical model, information protection, computer systems.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Semenenko, V.A. Informacionnaya bezopasnost \/ V.A. Semenenko. \u2013 M. : MGIU, 2011. \u2013 277 c. \u2013 ISBN 5-276-00872-8<\/li>\n<li>Baranova E.K. Informacionnaya bezopasnost i zashita informacii : ucheb. posobie \/ E.K. Baranova, A.V. Babash. \u2013 M. : RIOR: INFRA-M, 2017. \u2013 322 s. \u2013 ISBN: 978-5-369-01450-9<\/li>\n<li>Nesterov S.A. Osnovy informacionnoj bezopasnosti \/ S.A. Nesterov. \u2013 M. : Izd. \u00abLan\u00bb, 2016. \u2013 324 s. \u2013 ISBN: 978-5-8114-2290-6<\/li>\n<li>Biryukov A.A. Informacionnaya bezopasnost. Zashita i napadenie \/ A.A. Biryukov. \u2013 M. : DMKPress, 2017. \u2013 434 s. \u2013 ISBN: 978-5-97060-435-9<\/li>\n<li>Korpan Ya.V. Klasyfikatsiia zahroz informatsiinii bezpetsi v kompiuternykh systemakh pry viddalenii obrobtsi danykh \/ Ya.V.Korpan \/\/ Myr nauky y ynnovatsyi. \u2013 Yvanovo, Nauchn\u044bi myr, 2015. \u2013 T. 17, \u2116 2. \u2013 S. 39\u201346.<\/li>\n<li>Korpan Ya.V. Kompleks metodiv i zasobiv zakhystu informatsii u kompiuternykh systemakh \/ Ya.V. Korpan \/\/ Reiestratsiia, zberihannia i obrobka danykh. \u2013 2015. \u2013 V\u044b 1. \u2013 T. 3 2. \u2013 S. 31\u201335.<\/li>\n<li>Lokaziuk V. M. Zasady system pidtrymky pryiniattia rishen na osnovi kompiuternykh system ta yikh komponentiv : navch. posib. \/ V. M. Lokaziuk, O. V. Ivanov, V. Yu. Titova ; Khmelnyts. nats. un-t. \u2013 Khmelnytskyi : Honta A.S., 2010. \u2013 338 c.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>\u041a\u041b\u0410\u0421\u0418\u0424\u0406\u041a\u0410\u0426\u0406\u042f \u041c\u041e\u0414\u0415\u041b\u0415\u0419 \u0417\u0410\u0413\u0420\u041e\u0417 \u0412 \u041a\u041e\u041c\u041f\u2019\u042e\u0422\u0415\u0420\u041d\u0418\u0425 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425 CLASSIFICATION OF THREAT MODELS IN COMPUTER SYSTEMS \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 201-203. \u041d\u043e\u043c\u0435\u0440: \u21162, 2020 (283) \u0410\u0432\u0442\u043e\u0440\u0438: \u0412.\u042e. \u0422\u0406\u0422\u041e\u0412\u0410, \u042e.\u041f. \u041a\u041b\u042c\u041e\u0426, \u0421.\u041e. \u0421\u0410\u0412\u0427\u0423\u041a \u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 VERA YURIIVNA TITOVA, YURII PAVLOVYCH KLOTS, SERHII OLEHOVYCH SAVCHUK Khmelnytskyi National University DOI: https:\/\/www.doi.org\/10.31891\/2307-5732-2020-283-2-201-203 \u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review : 25.05.2020 \u0440. \u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed : 16.06.2020 \u0440. \u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[15],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1217"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1217"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1217\/revisions"}],"predecessor-version":[{"id":4061,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1217\/revisions\/4061"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}