<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2019-4-4-0-5</article-id><article-id pub-id-type="publisher-id">1881</article-id><article-categories><subj-group subj-group-type="heading"><subject>SYSTEM ANALYSIS AND PROCESSING OF KNOWLEDGE</subject></subj-group></article-categories><title-group><article-title>AUTOMATION OF CALCULATIONS OF INFORMATION SECURITY RISKS BY EXPERT ASSESSMENTS ON PYTHON</article-title><trans-title-group xml:lang="en"><trans-title>AUTOMATION OF CALCULATIONS OF INFORMATION SECURITY RISKS BY EXPERT ASSESSMENTS ON PYTHON</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kakaev</surname><given-names>Denis Valerievich</given-names></name><name xml:lang="en"><surname>Kakaev</surname><given-names>Denis Valerievich</given-names></name></name-alternatives><email>619deniss61999@gmail.com</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Aleksandrovna</given-names></name></name-alternatives><email>info@sevsu.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2019</year></pub-date><volume>4</volume><issue>4</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2019/4/ИТ_5_ultyDly.pdf" /><abstract xml:lang="ru"><p>Risk analysis allows you to make the right decisions on managing the company and doing business. Risks associated with information security of information are one of the main ones and are considered in international standards of the ISO / IEC 27000 series, and, in particular, national standards of the Russian Federation of the GOST R ISO/IEC 27000 series. Two groups of methods are distinguished for calculating in-formation security risks. The first group includes methods to determine the level of risk using the level of compliance with the selected set of requirements. The second group is based on the calculation of the probability of the implementation of threats, as well as the level of damage from their implementation. In the calculation, statistical methods, expert judgment methods or elements of decision theory can be used. Statistical methods are based on the analysis of already existing incidents in the field of information security. Based on the events already recorded, the probability of the threat and the level of damage from its implementation is calculated. This paper gives an ex-ample of the automation of information security risk calculations using expert assessments.&amp;nbsp;</p></abstract><trans-abstract xml:lang="en"><p>Risk analysis allows you to make the right decisions on managing the company and doing business. Risks associated with information security of information are one of the main ones and are considered in international standards of the ISO / IEC 27000 series, and, in particular, national standards of the Russian Federation of the GOST R ISO/IEC 27000 series. Two groups of methods are distinguished for calculating in-formation security risks. The first group includes methods to determine the level of risk using the level of compliance with the selected set of requirements. The second group is based on the calculation of the probability of the implementation of threats, as well as the level of damage from their implementation. In the calculation, statistical methods, expert judgment methods or elements of decision theory can be used. Statistical methods are based on the analysis of already existing incidents in the field of information security. Based on the events already recorded, the probability of the threat and the level of damage from its implementation is calculated. This paper gives an ex-ample of the automation of information security risk calculations using expert assessments.&amp;nbsp;</p></trans-abstract><kwd-group xml:lang="ru"><kwd>risks</kwd><kwd>expert assessment method</kwd><kwd>automation</kwd><kwd>Python</kwd></kwd-group><kwd-group xml:lang="en"><kwd>risks</kwd><kwd>expert assessment method</kwd><kwd>automation</kwd><kwd>Python</kwd></kwd-group></article-meta></front><back /></article>