COMPUTER TARGET AND STRATEGY FORMATION OF THE INFORMATION SYSTEM SAFETY VIOLATOR

The article deals with communication of strategic, tactical targets and the strategy realized by the violator of safety of information system. Semantic models and algorithms are developed for a conclusion of the purposes and strategies; criteria and tasks for strategies assessment, based on represen...

Full description

Saved in:
Bibliographic Details
Main Author: Olga V. Lukinova
Format: Article
Language:English
Published: Plekhanov Russian University of Economics 2016-05-01
Series:Открытое образование (Москва)
Subjects:
Online Access:https://openedu.rea.ru/jour/article/view/209
Tags: Add Tag
No Tags, Be the first to tag this record!