Algorithm for ranking information security threats based on the hierarchy analysis method
Abstract
Algorithm for ranking information security threats based on the hierarchy analysis method
Incoming article date: 23.06.2024One of the most pressing tasks in ensuring data protection in information systems is the classification and ranking of threat sources. All threat sources have varying degrees of danger to information system assets. Ranking allows you to prioritize when designing an information security system and allocate greater resources to prevent the most pressing and significant threats. This article discusses an algorithm for ranking threats based on the hierarchy analysis method.
Keywords: data protection, information technology, hierarchy process analysis, systems analysis, information systems, information security