Світлана Володимирівна Казмірчук

ORCID: 0000-0001-6083-251X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cybersecurity and Information Systems
  • Information Systems and Technology Applications
  • Advanced Data Processing Techniques
  • Economic and Technological Systems Analysis
  • Network Security and Intrusion Detection
  • Cryptography and Data Security
  • Cryptography and Residue Arithmetic
  • Information and Cyber Security
  • Advanced Decision-Making Techniques
  • Cloud Data Security Solutions
  • Advanced Research in Systems and Signal Processing
  • Innovative Educational Techniques
  • Aerospace, Electronics, Mathematical Modeling
  • Military Technology and Strategies
  • Chaos-based Image/Signal Encryption
  • Spam and Phishing Detection
  • Advanced Computational Techniques in Science and Engineering
  • Engineering Education and Technology

State University "Kyiv Aviation Institute"
2015-2024

National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”
2024

Security Service of Ukraine
2024

National Security and Defense Council of Ukraine
2024

The results of the research aimed at further development detection models cyber threats, as well common classes anomalies and cyber-attacks in mission critical computer systems (MCCS) are presented.It is shown that one promising directions synthesis adaptive prevention application logical procedures detection, based on coverage matrices features anomalies, threats within known new MCCS intrusions. model cyber-attacks, to was designed, which learning samples form elementary classifiers for...

10.15587/1729-4061.2016.71769 article EN Eastern-European Journal of Enterprise Technologies 2016-06-27

One of the pressing areas that is developing in field information security associated with use Honeypots (virtual decoys, online traps), and selection criteria for determining most effective their further classification an urgent task. The main products implement virtual decoy technologies are presented. They often used to study behavior, approaches methods unauthorized party uses gain access system resources. Online hooks can simulate any resource, but more they look like real production...

10.15587/1729-4061.2021.225346 article EN Eastern-European Journal of Enterprise Technologies 2021-02-26

The study showed that mainly for analysis and risk assessment used statistical data on incidents information security threats. In many countries at the state level, such statistics are not kept, which limits possibilities of existing tools national use. It should also be noted sets expert certain limitations (on set parameters) gives him possibility applying evaluation a wider range values. Based this, two methods presented risk, allow you to use wide parameters, giving opportunity create...

10.15866/irecos.v11i2.8233 article EN International Review on Computers and Software (IRECOS) 2016-02-29

There is system analysis and information security risks assessment based on processing of linguistic variables. These variables are standard parametric trapezoidal fuzzy numbers with a fixed number term sets. standards defined by experts at the initialization stage basic units in course setup. Its efficient use will increase, if there possibility correction without corresponding experts' involvement. To solve this problem, implementation method function transformation single increment terms...

10.1109/infocommst.2015.7357330 article EN 2015-10-01

The construction of information security management system (ISMS), complex and other systems require carrying out the analysis risk assessment. existing assessment tools in its majority are based on statistical approaches. In many countries, both at enterprise level State such statistics is not conducted. This limits ability tools, as use different input data types for A known tool gives no administration opportunity risks a wide range initial parameters. On t he basis proposed method, which...

10.18372/2410-7840.15.4216 article EN cc-by-nc-nd Ukrainian Information Security Research Journal 2013-03-15

As information technologies progress further, the number of vulnerabilities and threats to various data processing systems increases, creating a need for specialized security tools ensure proper functioning intrusion prevention. A promising area rapid growth within field is cyberattack detection prevention unauthorized party access. To identify network intrusions, use modern methods, models, controls integrated technical solutions that can remain effective when new or modified types...

10.18372/2410-7840.20.13425 article EN Ukrainian Information Security Research Journal 2018-12-21

There are many ways to organize authentication and authorization in information systems. Typically, is used provide login, primarily a security tool for personal user data. It the first level of protection against receiving any system information. In turn, helps ensure data integrity when running multiple different users with permissions. The communication systems includes circulating computer designed storing, searching processing (databases, application programs, control various devices,...

10.1109/atit50783.2020.9349333 article EN 2020-11-25

Был проведен анализ понятия риска в различных предметных областях с точки зрения безопасности, психологии, экономики, страхования, медицины, геологии и т.д., которое раскрывалось как монографиях, статьях, учебниках, словарях так нормативных национальных международных документах. Определены базовые характеристики из множества его толкований для последующей интерпретации информационной безопасности. Предлагается интеграции определения риска, отображением области ИБ, представить виде кортежа...

10.18372/2410-7840.13.2001 article RU cc-by Ukrainian Information Security Research Journal 2011-03-15

The detailed analysis of problem is conducted and the method estimation size quantitative high-quality parameters possible harm national safety state developed in case disclosure information which make a secret or losses financial carriers data.

10.18372/2410-7840.14.3352 article EN cc-by Ukrainian Information Security Research Journal 2012-09-15

Applied results of scientific analysis should be the key focus modern security research. A comparative research obtained using different methods, as an applied task, forms a broader basis for interpreting and substantiating conclusions. social survey expert opinion were conducted to implement general concept strategic cybersecurity in Ukraine. Using method based on determining average value certain set estimates, well theory fuzzy sets, risks spreading cyber threats Ukraine assessed. The...

10.5815/ijcnis.2024.01.02 article EN International Journal of Computer Network and Information Security 2024-01-30

The known information security assessment risk system(developed by authors) is based on processing methods oflinguistic variables. These variables are thestandard parametric trapezoidal fuzzy numbers with afixed number of term sets. Etalons defined expertsat the stage base units initialization during setting-upsystem. Efficiency its use would increase if it isavailable to correct etalons without involvement ofappropriate experts. To solve this problem authorspropose a method function...

10.18372/2410-7840.17.8758 article EN cc-by-nc-nd Ukrainian Information Security Research Journal 2015-06-25

В работе представлено методологию синтеза систем анализа и оценки риска потерь информационных ресурсов, которая позволяет использовать широкий спектр параметров, дающая возможность создавать более гибкие средства анализа, а также оценивать риски, как на основе статистических данных, так экспертных оценках, сделанных в неопределенной, слабоформализованной среде с учетом периода времени, отрасли, экономической управленческой специфики предприятия др. Кроме этого, методология дает отражать...

10.18372/2410-7840.14.2178 article RU cc-by Ukrainian Information Security Research Journal 2012-06-15

В работе проведено исследование широкого спектра существующих методик и программного обеспечения управления информационными рисками относительно набора параметров, характеризующих риск. К этим параметрам принадлежат: событие, действие, характеристика ситуации, мера, вероятность, опасность, затраты потери. Для этих средств с учетом интегрированных параметров риска составлен кортеж, который даст возможность унифицировать процесс сравнительного анализа соответствующего инструментального...

10.18372/2410-7840.14.2054 article RU cc-by Ukrainian Information Security Research Journal 2012-03-15

Стремительное развитие ІТ-инфраструктуры предприятий неизменно влечет за собой неконтролируемый рост количества информационных угроз и уязвимостей ресурсов. В этих условиях оценка рисков позволяет определить необходимый уровень защиты информации, осуществить его поддержку разработать стратегию развития информационной структуры компании. Оценка анализ является необходимым условием при создании системы управления рисками плана обеспечения непрерывности возобновления бизнеса.

10.18372/2410-7840.12.1954 article RU cc-by Ukrainian Information Security Research Journal 2010-09-15

Nowadays, one of the relevant areas that is developing in field information security associated with use Honeypot (virtual lures, online traps), and selection criteria for determination most effective their further classification an urgent task. There are presented main products which virtual lures technology implemented. Often they used to study behavior, approaches methods unauthorized party uses access system resources. Online traps can imitate any resource, but more often look like real...

10.32014/2020.2518-1467.138 article EN BULLETIN OF THE NATIONAL ACADEMY OF SCIENCES OF THE REPUBLIC OF KAZAKHSTAN ( THE BULLETIN) 2020-10-15

The known information security assessment risk system (developed by authors) is based on processing methods of linguis-tic variables. These variables are the standard parametric trapezoidal fuzzy numbers with a fixed number term sets. Eta-lons defined experts at stage base units initialization during setting-up system. Efficiency its use would increase if it available to correct etalons without involvement appropriate experts. To solve this problem authors propose method function realization...

10.18372/2225-5036.21.8321 article EN cc-by-nc-nd Ukrainian Scientific Journal of Information Security 2015-04-20

The known information security assessment risk system (developed by authors) is based on processing methods of linguistic variables. Their foundation are reference parametric trapezoidal fuzzy numbers with different plurality defining terms, the formation which associated involvement experts in relevant subject area. For more efficient use such it's necessary to provide abilities: handle types and transform amount terms without real-time mode. To solve this problem we propose n-fold decrease...

10.1109/idaacs.2015.7340781 article EN 2015-09-01

В работе проведено исследование широкого спектра существующего программного обеспечения анализа и оценки риска относительно набора параметров, характеризующих риск. К таким параметрам относятся событие, действие, характеристика ситуации, мера, вероятность, опасность, затраты потери. наиболее известным программным продуктам, которые использованы для исследования, RiskWatch, RA2 art of risk, Risk Advisor, OCTAVE др. Для этих средств с учетом интегрированных параметров составлен кортеж, который...

10.18372/2410-7840.13.2040 article RU cc-by Ukrainian Information Security Research Journal 2011-09-15

The construction of information security management system requires providing the analysis and risk assessment that are often characterized by high fuzzy conditions. existing tools do not provide opportunities for a wide range initial parameters. On basis proposed method it was implemented an appropriate software system. It allows making in conditions using established components, which displayed model integrated concept parameters can be represented both numerical linguistic forms. To...

10.18372/2410-7840.15.4778 article EN cc-by Ukrainian Information Security Research Journal 2013-06-15

Проведен анализ базовых понятий связанных с управлением риска в сфере информационной безопасности. Относительно этого построена схема зависимости процессов и его интегрированными параметрами. Это даст возможность унифицировать процесс исследования существующих методов методик анализа оценки риска, повысит эффективность осуществления их выбора. Также приведен пример наиболее известных использованием интегрированных параметров.

10.18372/2410-7840.13.2016 article RU cc-by Ukrainian Information Security Research Journal 2011-06-15

To implement the process of analysis and information risk assessment based on expert judgments it is required to use some methods means that make possible handle with fuzzy input data, for example, presented in linguistic form. There a system where an parametric trapezoidal numbers. A practical implementation this requires application other types The development capabilities such can be achieved through additional another type numbers-triangular. solve task paper suggests conversion method...

10.18372/2410-7840.15.5729 article EN cc-by Ukrainian Information Security Research Journal 2013-12-20
Coming Soon ...