<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2019-4-1-0-5</article-id><article-id pub-id-type="publisher-id">1641</article-id><article-categories><subj-group subj-group-type="heading"><subject>SYSTEM ANALYSIS AND PROCESSING OF KNOWLEDGE</subject></subj-group></article-categories><title-group><article-title>ANALYSIS AND DEFINITION OF INFORMATION SECURITY RISKS</article-title><trans-title-group xml:lang="en"><trans-title>ANALYSIS AND DEFINITION OF INFORMATION SECURITY RISKS</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>info@sevsu.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2019</year></pub-date><volume>4</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2019/1/ит5.pdf" /><abstract xml:lang="ru"><p>Any information requires an effective system of protection and is to ensure the sustainable development and functioning of the object. The costs necessary to protect the information are not always justified. Therefore, an important condition for information security is the task of finding the appropriate level of protection at an acceptable cost. The importance of identifying risks in different areas is crucial for the development and stability of enterprises, which makes it possible to understand and assess possible dangerous events, to identify their causes and consequences, the probability of occurrence and decision-making, which is one of the challenges. To do this, it is necessary to conduct an analysis of information security risks, with which it will be possible to assess the existing level of security of resources of any organization. There are various approaches, methods and tools for assessing information security risks, leading to the end result, both with advantages and disadvantages of management. We will evaluate and analyze these methods and identify more acceptable, effective and less costly.</p></abstract><trans-abstract xml:lang="en"><p>Any information requires an effective system of protection and is to ensure the sustainable development and functioning of the object. The costs necessary to protect the information are not always justified. Therefore, an important condition for information security is the task of finding the appropriate level of protection at an acceptable cost. The importance of identifying risks in different areas is crucial for the development and stability of enterprises, which makes it possible to understand and assess possible dangerous events, to identify their causes and consequences, the probability of occurrence and decision-making, which is one of the challenges. To do this, it is necessary to conduct an analysis of information security risks, with which it will be possible to assess the existing level of security of resources of any organization. There are various approaches, methods and tools for assessing information security risks, leading to the end result, both with advantages and disadvantages of management. We will evaluate and analyze these methods and identify more acceptable, effective and less costly.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>information risks</kwd><kwd>information security</kwd><kwd>threat</kwd><kwd>damage</kwd><kwd>vulnerability</kwd><kwd>qualitative method</kwd><kwd>quantitative method</kwd><kwd>risk assessment</kwd></kwd-group><kwd-group xml:lang="en"><kwd>information risks</kwd><kwd>information security</kwd><kwd>threat</kwd><kwd>damage</kwd><kwd>vulnerability</kwd><kwd>qualitative method</kwd><kwd>quantitative method</kwd><kwd>risk assessment</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Bilozerova A.A., Mikova S.Yu.. Nesterenko M.A. Risk assessment of is when using ERP-systems // M.: Molodoy ucheny 2016. №15. p. 152-155.</mixed-citation></ref><ref id="B2"><mixed-citation>Buldakova T.I., Mikov D.A. Implementation of information security risk assessment methodology in Matlab environment M.: Voprosy kiberbezopasnosti // Voprosy kiberbezopasnosti 2015. №4(12). p. 53-61.</mixed-citation></ref><ref id="B3"><mixed-citation>Information security management issues Kurilo A.P., Miloslavska N.G., Senatorov M.Yu., Tolstoy&amp;nbsp;A.I. Goryachaya liniya &amp;ndash; Telekom, 2015. 234 p.</mixed-citation></ref><ref id="B4"><mixed-citation>Gerasimenko V.A., Malyuk A.A. Framework for the protection of information by information protection M.: Inkombuk. 1997.</mixed-citation></ref><ref id="B5"><mixed-citation>Lvova A.V. Methods of analysis and management of security risks protected information system: Avtoref. Dis. Kand. Tekh. Nauk. M.: 2009. 198 p.</mixed-citation></ref><ref id="B6"><mixed-citation>Methodology for determining information security threats in information systems, 2015 y. URL: https://fstec.ru/component/attachments/download/812 (data obrashcheniyaya 07.01.2019).</mixed-citation></ref><ref id="B7"><mixed-citation>Sibikina I.V. Information security risk analysis using fuzzy inference system // Nauchnyy vestnik NGT Science Bulletin of the NSTU tome 65, 2016. № 4. p. 121&amp;ndash;134.</mixed-citation></ref><ref id="B8"><mixed-citation>Khoffman L.Dzh. Modern methods of information security. M: Sovetskoye radio. 1980.</mixed-citation></ref><ref id="B9"><mixed-citation>International Standard ISO/IEC 27000, 2009 y. URL: http://pqm-online.com/assets/files/lib/std/iso_iec_27000-2009.pdf (data obrashcheniyaya 15.11.18)</mixed-citation></ref><ref id="B10"><mixed-citation>Information security risks assessment: a case study / Samuel С.А., Bonaventure N, Olasunkanmi A., RobinLlal Khoshi, Samarappulige I.M. // Р 13 [Electronic resource]: file:///D:/англоязычные%20стаатьи/1812_04659.pdf</mixed-citation></ref><ref id="B11"><mixed-citation>Information security risk management: an intelligence-driven approach // Jeb Webb, Sean Maynard, Atif Ahmad, Graeme Shanks. Australasian Journal of Information Systems. Volume 18 Number 3, 2014.</mixed-citation></ref><ref id="B12"><mixed-citation>Reversible Recurrent Neural Networks // Matthew MacKay, Paul Vicol, Jimmy Ba, Roger Grosse, University of Toronto, Vector Institute [Electronic resource]: https://arxiv.org/pdf/1810.10999.pdf</mixed-citation></ref></ref-list></back></article>