<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2016-1-4-29-35</article-id><article-id pub-id-type="publisher-id">892</article-id><article-categories><subj-group subj-group-type="heading"><subject>SYSTEM ANALYSIS AND PROCESSING OF KNOWLEDGE</subject></subj-group></article-categories><title-group><article-title>MODEL OF EVALUATION AND PREDICTION OF INVESTMENT RISKS OF INFORMATION SECURITY OF INDUSTRIAL ENTERPRISES</article-title><trans-title-group xml:lang="en"><trans-title>MODEL OF EVALUATION AND PREDICTION OF INVESTMENT RISKS OF INFORMATION SECURITY OF INDUSTRIAL ENTERPRISES</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Babenko</surname><given-names>Aleksey Alexandrovich</given-names></name><name xml:lang="en"><surname>Babenko</surname><given-names>Aleksey Alexandrovich</given-names></name></name-alternatives><email>ba_benko@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kozunova</surname><given-names>Svetlana Sergeevna</given-names></name><name xml:lang="en"><surname>Kozunova</surname><given-names>Svetlana Sergeevna</given-names></name></name-alternatives><email>one1100on@gmail.com</email></contrib></contrib-group><pub-date pub-type="epub"><year>2016</year></pub-date><volume>1</volume><issue>4</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2016/4/5_it.pdf" /><abstract xml:lang="ru"><p>The research is devoted to the problem of investment information security industry. The authors identify the investments into information security. Besides, they analyze the risks of investing the information security industry. As a solution to the problem of the study the authors propose a formalized model for evaluating and predicting risks of investing the information security industry. This model is based on the determination of the importance of information assets, risk assessment and forecasting damage. The model was used in a series of experimental studies. As a tool for the implementation of the model the authors selected the interactive environment for programming numerical computations and visualization of MATLAB results. Experimental studies of the proposed model showed the possibility of improving the efficiency and decreasing risks, as well as forecasting the risks of investing the information security industry with the help of the developed method of estimation and forecasting.</p></abstract><trans-abstract xml:lang="en"><p>The research is devoted to the problem of investment information security industry. The authors identify the investments into information security. Besides, they analyze the risks of investing the information security industry. As a solution to the problem of the study the authors propose a formalized model for evaluating and predicting risks of investing the information security industry. This model is based on the determination of the importance of information assets, risk assessment and forecasting damage. The model was used in a series of experimental studies. As a tool for the implementation of the model the authors selected the interactive environment for programming numerical computations and visualization of MATLAB results. Experimental studies of the proposed model showed the possibility of improving the efficiency and decreasing risks, as well as forecasting the risks of investing the information security industry with the help of the developed method of estimation and forecasting.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>industry</kwd><kwd>evaluation</kwd><kwd>forecasting</kwd><kwd>risk</kwd><kwd>investment</kwd><kwd>information security</kwd><kwd>model</kwd><kwd>process</kwd></kwd-group><kwd-group xml:lang="en"><kwd>industry</kwd><kwd>evaluation</kwd><kwd>forecasting</kwd><kwd>risk</kwd><kwd>investment</kwd><kwd>information security</kwd><kwd>model</kwd><kwd>process</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Panasenko A. Confidential Data Continue to Leak. [Electronic resource]. URL: http://www.anti-malware.ru/analytics/Threats_Analysis/Sensitive_data_continue_leak. (date of access: April 3, 2016)</mixed-citation></ref><ref id="B2"><mixed-citation>Zecurion Analytics. Leaks of confidential information. - [Electronic resource]. URL: http://www.zecurion.ru/upload/iblock/fe3/Zecurion_Data_leaks_2015.pdf (date of access: April 8, 2016)</mixed-citation></ref><ref id="B3"><mixed-citation>Voronina Y. Managers Pulled the Rug out. Russian Business Newspaper. (936) [Electronic resource]. URL: http://www.rg.ru/2014/02/25/utechka.html (date of access: March 2, 2016)</mixed-citation></ref><ref id="B4"><mixed-citation>Kozunova S.S., Babenko A.A. Optimize Risks System of Information Security of Industrial Enterprises. (7). Pp. 22-29. 2016.</mixed-citation></ref><ref id="B5"><mixed-citation>Development of a Hierarchical Multicriteria Expert Quality Assessment Procedures. Putivtseva N.P., Igrunova S.V., Belov E.Y., Captain S.A. Research Result. Vol.1 (1). Pp. 39-47. 2016.</mixed-citation></ref><ref id="B6"><mixed-citation>Gordon, L.A., M.P. Loeb and T. Sohail. 2010. Market Value of Voluntary Disclosures Concerning Information Security // MIS Quarterly. Vol. 34, No. 3. Pp. 567-594.</mixed-citation></ref><ref id="B7"><mixed-citation>Lawrence A. Gordon, Martin P. Loeb, Lei Zhou Investing in Cybersecurity: Insights from the Gordon-Loeb Model // Journal of Information Security. 2016. Vol.07 No.02. Pp.49-59.</mixed-citation></ref><ref id="B8"><mixed-citation>Kozunova S.S., Babenko A.A., Zubareva E.V. 2016. Analysis of the Investment Evaluation Process in Information Security. Part 1. Pp. 21-24.</mixed-citation></ref><ref id="B9"><mixed-citation>Finogeev A, Fionova L, Finogeev A, Nefedova I, Finogeev E, Vinh T.Q., Kamaev V. 2015. Methods and tools for secure sensor data transmission and data mining in energy SCADA system. Communications in Computer and Information Science 535.&amp;nbsp;Pp. 474-484.</mixed-citation></ref><ref id="B10"><mixed-citation>Bodin, L., L.A. Gordon and M.P. Loeb. 2008. Information Security and Risk Management // Communications of the ACM, Vol. 51, No. 4. Pp 1-9.</mixed-citation></ref></ref-list></back></article>