<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2019-4-1-0-2</article-id><article-id pub-id-type="publisher-id">1638</article-id><article-categories><subj-group subj-group-type="heading"><subject>SYSTEM ANALYSIS AND PROCESSING OF KNOWLEDGE</subject></subj-group></article-categories><title-group><article-title>SOFTWARE IMPLEMENTATION OF THE METHOD FOR DETERMINING THE ACTUAL THREATS TO THE PERSONAL DATA SECURITY</article-title><trans-title-group xml:lang="en"><trans-title>SOFTWARE IMPLEMENTATION OF THE METHOD FOR DETERMINING THE ACTUAL THREATS TO THE PERSONAL DATA SECURITY</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Goncharenko</surname><given-names>Julia Юрьевна</given-names></name><name xml:lang="en"><surname>Goncharenko</surname><given-names>Julia</given-names></name></name-alternatives><email>iuliay1985@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kushnaryov</surname><given-names>Aleksandr Александрович</given-names></name><name xml:lang="en"><surname>Kushnaryov</surname><given-names>Aleksandr</given-names></name></name-alternatives><email>sahsa14.95@yandex.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Isakov</surname><given-names>Sergey Алексеевич</given-names></name><name xml:lang="en"><surname>Isakov</surname><given-names>Sergey</given-names></name></name-alternatives><email>engener1990@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2019</year></pub-date><volume>4</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2019/1/ит2.pdf" /><abstract xml:lang="ru"><p>The most relevant and widespread type of information that almost all organizations of the Russian Federation work with is personal data. Because of their prevalence, they require special vigilance in their processing and security. Information systems processing personal data may be subject to various attacks due to certain vulnerabilities. To ensure maximum protection of the personal data information system, the Federal Service for Technical and Export Control has developed a special methodology for determining the current threats to the information system. In order to reduce the expert&amp;#39;s labor in assessing each threat, the automation of this process will be relevant, which in the end will not only give a gain in time, but also reduce the number of errors associated with the human factor.</p></abstract><trans-abstract xml:lang="en"><p>The most relevant and widespread type of information that almost all organizations of the Russian Federation work with is personal data. Because of their prevalence, they require special vigilance in their processing and security. Information systems processing personal data may be subject to various attacks due to certain vulnerabilities. To ensure maximum protection of the personal data information system, the Federal Service for Technical and Export Control has developed a special methodology for determining the current threats to the information system. In order to reduce the expert&amp;#39;s labor in assessing each threat, the automation of this process will be relevant, which in the end will not only give a gain in time, but also reduce the number of errors associated with the human factor.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>personal data</kwd><kwd>current security threats</kwd><kwd>personal data information system</kwd><kwd>threat model</kwd><kwd>software implementation</kwd></kwd-group><kwd-group xml:lang="en"><kwd>personal data</kwd><kwd>current security threats</kwd><kwd>personal data information system</kwd><kwd>threat model</kwd><kwd>software implementation</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Oleg Slepov. Protection of personal information. Jet Infosystems IT portal: electronic journal, 2009. №5. URL: http://www.jetinfo.ru/jetinfo_arhiv/zaschita-personalnykh-dannykh/zaschita-personalnykh/2017 (handling date: 11/12/2018).</mixed-citation></ref><ref id="B2"><mixed-citation>Malyuk A.A., Pazizin S.V., Pogozhin N.S. Introduction to information security in automated systems. Moscow: Goryachaya liniya-telekom, 2001. 148.</mixed-citation></ref><ref id="B3"><mixed-citation>Federal Law &amp;ldquo;On Personal Data&amp;rdquo; dated July 27, 2006 No. 152-ФЗ. URL: http://www.consultant.ru/document/cons_doc_LAW_61801/ (handling date: 10/12/2018).</mixed-citation></ref><ref id="B4"><mixed-citation>The method of determining the actual threats to the security of personal data during their processing in the information systems of personal data. FSTEC of Russia, 2008. URL: https://fstec.ru/tekhnicheskaya-zashchita-informatsii/dokumenty/114-spetsialnye-normativnye-dokumenty/380/ (handling date: 12/11./018).</mixed-citation></ref><ref id="B5"><mixed-citation>HTML: Basics for Beginners. URL: http://fb.ru/article/250376/html-osnovyi-dlya-nachinayuschih/ (handling date: 12/14/2018).</mixed-citation></ref><ref id="B6"><mixed-citation>What is HTML? URL: https://blogwork.ru/chto-takoe-html/ (handling date: 12/14/2018).</mixed-citation></ref></ref-list></back></article>