Next Article in Journal
Supersymmetric NJL-Type Model for a Real Superfield Composite
Next Article in Special Issue
Automatic Defect Inspection for Coated Eyeglass Based on Symmetrized Energy Analysis of Color Channels
Previous Article in Journal
Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All
Previous Article in Special Issue
The Influence of AlGaN/GaN Heteroepitaxial Structure Fractal Geometry on Size Effects in Microwave Characteristics of AlGaN/GaN HEMTs
Open AccessArticle

Model of Threats to Computer Network Software

Department of Complex Information Security of Computer Systems, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, Russia
*
Author to whom correspondence should be addressed.
Symmetry 2019, 11(12), 1506; https://doi.org/10.3390/sym11121506
Received: 31 October 2019 / Revised: 26 November 2019 / Accepted: 10 December 2019 / Published: 11 December 2019
(This article belongs to the Special Issue Information Technologies and Electronics)
This article highlights the issue of identifying information security threats to computer networks. The aim of the study is to increase the number of identified threats. Firstly, it was carried out the analysis of computer network models used to identify threats, as well as in approaches to building computer network threat models. The shortcomings that need to be corrected are highlighted. On the basis of the mathematical apparatus of attributive metagraphs, a computer network model is developed that allows to describe the software components of computer networks and all possible connections between them. On the basis of elementary operations on metagraphs, a model of threats to the security of computer network software is developed, which allows compiling lists of threats to the integrity and confidentiality of computer network software. These lists include more threats in comparison with the considered analogues. View Full-Text
Keywords: computer network model; threat model; threat classification computer network model; threat model; threat classification
Show Figures

Figure 1

MDPI and ACS Style

Novokhrestov, A.; Konev, A.; Shelupanov, A. Model of Threats to Computer Network Software. Symmetry 2019, 11, 1506.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop