- •Санкт-петербургский государственный электротехнический университет
- •Кафедра информационной безопасности
- •Выбор приоритетов целей иб
- •Коэффициенты приоритетности целей иб
- •Ранжирование угроз иб
- •Коэффициенты актуальности угроз иб
- •Ранжирование групп источников угроз иб
- •Весовые коэффициенты групп источников иб при равенстве приоритетов целей
- •Ранжирование источников угроз иб
- •Ориентировочная оценка степени опасности источников угроз иб
- •Перечень актуальных источников угроз иб
- •Ранжирование групп методов реализации угроз иб
- •Нормированные весовые коэффициенты групп методов реализации угроз и взаимосвязи групп методов реализации и источников угроз при равенстве приоритетов целей информационной безопасности
- •Расчет коэффициента корреляции
- •Коэффициенты корреляции и промежуточные результаты расчетов
- •Ориентировочная оценка степени опасности уязвимостей
- •Перечень актуальных уязвимостей
- •Перечень актуальных угроз
- •Возможные варианты атак
- •Реализация угрозы «хищение»
- •Реализация угроз «уничтожение»
- •III. Создание условий для реализации угроз
Перечень актуальных уязвимостей
-
Код
Уязвимости
(k1)f
(k2)f
(k3)f
(Kоп)f
[A.II.a.4]
аппаратные закладки, устанавливаемые в технических средствах
5
4
5
0,51
[A.II.b.1]
вредоносные программы
5
5
5
0,64
[A.IV.a.1]
отсутствие контролируемой зоны
4
5
4
0,50
[A.IV.a.2]
наличие прямой видимости объектов
4
4
4
0,40
[A.IV.b.2]
использование глобальных информационных сетей
5
5
5
0,78
[B.I.a.2]
ошибки при инсталляции и загрузке программного обеспечения
3
4
5
0,39
[B.I.a.3]
ошибки при эксплуатации программного обеспечения
4
5
5
0,66
[B.I.b.1]
ошибки при включении/выключении технических средств
3
5
5
0,50
[B.I.c.3]
ошибки при организации управления потоками обмена информации
3
4
3
0,23
[B.I.d.2]
повреждение (удаление) данных
5
5
5
0,83
[B.I.d.3]
повреждение (уничтожение) носителей информации
5
4
4
0,53
[B.II.a.2]
нарушения доступа к техническим средствам
5
4
5
0,62
[B.II.a.3]
нарушения соблюдения
конфиденциальности
4
4
4
0,39
[C.I.c.1]
сбои операционных систем и СУБД
4
5
4
0,56
[C.I.c.4]
сбои антивирусных программ
4
4
4
0,45
Перечень актуальных угроз
-
k
Угрозы ИБ
(КА)k
1
Хищение (копирование) информации и средств ее обработки
0,19
2
Уничтожение информации и средств ее обработки
0,17
3
Создание условий для реализации угрозы ИБ
0,19
Возможные варианты атак
Реализация угрозы «хищение»
[I.A.2]
[M1.A.02]
[B.II.a.3]
[I.A.2]
[M1.B.02]
[A.IV.b.2]
[I.A.2]
[M1.B.02]
[A.IV.b.3]
[I.A.2]
[M1.B.02]
[B.II.a.3]
[I.A.2]
[M1.B.03]
[A.IV.b.2]
[I.A.2]
[M1.B.03]
[A.IV.b.3]
[I.A.2]
[M1.B.03]
[B.II.a.2]
[I.A.2]
[M1.B.03]
[B.II.a.3]
[I.A.2]
[M2.A.04]
[A.IV.b.3]
[I.A.2]
[M2.A.04]
[B.I.a.2]
[I.A.2]
[M2.A.04]
[B.I.a.3]
[I.A.2]
[M2.A.04]
[B.I.b.1]
[I.A.2]
[M2.B.01]
[A.IV.a.1]
[I.A.2]
[M2.B.01]
[A.IV.a.2]
[I.A.2]
[M2.B.01]
[B.II.a.2]
[I.A.2]
[M2.B.02]
[A.IV.a.1]
[I.A.2]
[M2.B.02]
[A.IV.a.2]
[I.A.2]
[M2.B.02]
[B.II.a.2]
[I.A.2]
[M2.B.03]
[A.II.a.4]
[I.A.2]
[M2.B.03]
[A.IV.b.2]
[I.A.2]
[M2.B.03]
[A.IV.b.3]
[I.A.2]
[M2.B.03]
[B.II.a.2]
[I.A.2]
[M2.B.04]
[A.IV.b.3]
[I.A.2]
[M2.B.04]
[B.II.a.2]
[I.A.2]
[M2.B.05]
[A.IV.b.3]
[I.A.2]
[M2.B.05]
[B.II.a.2]
[I.A.2]
[M3.A.09]
[B.II.a.2]
[I.A.2]
[M3.A.10]
[A.II.b.1]
[I.A.2]
[M3.A.10]
[A.IV.b.2]
[I.A.2]
[M3.A.10]
[B.I.a.3]
[I.A.2]
[M3.A.10]
[B.II.a.2]
[I.A.2]
[M3.A.11]
[A.II.b.1]
[I.A.2]
[M3.A.11]
[A.IV.b.2]
[I.A.2]
[M3.A.11]
[B.I.a.2]
[I.A.2]
[M3.A.11]
[B.I.a.3]
[I.A.2]
[M3.A.11]
[C.I.c.1]
[I.A.2]
[M3.A.11]
[C.I.c.4]
[I.A.2]
[M3.A.14]
[A.II.b.1]
[I.A.2]
[M3.A.14]
[A.IV.b.2]
[I.A.2]
[M3.A.14]
[A.IV.b.3]
[I.A.2]
[M3.B.02]
[A.II.a.4]
[I.A.2]
[M3.B.02]
[A.II.b.1]
[I.A.2]
[M3.B.02]
[A.IV.a.1]
[I.A.2]
[M3.B.02]
[A.IV.b.2]
[I.A.2]
[M3.B.02]
[B.II.a.2]
[I.A.2]
[M3.B.03]
[A.IV.b.2]
[I.A.2]
[M3.B.03]
[A.IV.b.3]
[I.A.2]
[M3.B.03]
[B.II.a.2]
[I.B.1]
[M2.A.04]
[A.IV.a.1]
[I.B.1]
[M2.A.04]
[A.IV.b.3]
[I.B.1]
[M2.A.04]
[B.I.a.2]
[I.B.1]
[M2.B.01]
[A.IV.a.1]
[I.B.1]
[M2.B.01]
[A.IV.a.2]
[I.B.1]
[M3.A.08]
[B.I.a.3]
[I.B.1]
[M3.A.08]
[B.I.c.3]
[I.B.1]
[M3.A.08]
[B.II.a.2]
[I.B.1]
[M3.A.09]
[A.II.b.1]
[I.B.1]
[M3.A.09]
[A.IV.b.2]
[I.B.1]
[M3.A.09]
[B.I.a.3]
[I.B.1]
[M3.A.09]
[B.I.c.3]
[I.B.1]
[M3.A.09]
[B.II.a.2]
[I.B.1]
[M3.A.10]
[A.II.b.1]
[I.B.1]
[M3.A.10]
[A.IV.b.2]
[I.B.1]
[M3.A.10]
[B.I.a.3]
[I.B.1]
[M3.A.11]
[A.II.b.1]
[I.B.1]
[M3.A.11]
[A.IV.b.2]
[I.B.1]
[M3.A.11]
[B.I.a.3]
[I.B.1]
[M3.A.11]
[C.I.c.1]
[I.B.1]
[M3.A.11]
[C.I.c.4]
[I.B.1]
[M3.A.14]
[A.II.b.1]
[I.B.1]
[M3.A.14]
[A.IV.b.2]
[I.B.1]
[M3.A.14]
[A.IV.b.3]
[I.B.1]
[M3.B.02]
[A.II.a.4]
[I.B.1]
[M3.B.02]
[A.II.b.1]
[I.B.1]
[M3.B.02]
[A.IV.a.1]
[I.B.1]
[M3.B.02]
[A.IV.b.2]
[I.B.1]
[M3.B.02]
[B.II.a.2]
[I.B.1]
[M3.B.03]
[A.IV.b.2]
[I.B.1]
[M3.B.03]
[A.IV.b.3]
[I.B.2]
[M3.A.01]
[A.IV.b.2]
[I.B.2]
[M3.A.01]
[A.IV.b.3]
[I.B.2]
[M3.A.01]
[B.I.c.3]
[I.B.2]
[M3.A.04]
[A.IV.b.2]
[I.B.2]
[M3.A.04]
[B.I.b.1]
[I.B.2]
[M3.A.04]
[B.II.a.2]
[I.B.2]
[M3.A.05]
[A.II.b.1]
[I.B.2]
[M3.A.05]
[A.IV.b.2]
[I.B.2]
[M3.A.05]
[B.I.b.1]
[I.B.2]
[M3.A.05]
[B.II.a.2]
[I.B.2]
[M3.A.05]
[C.I.c.1]
[I.B.2]
[M3.A.05]
[C.I.c.4]
[I.B.2]
[M3.A.07]
[A.IV.b.2]
[I.B.2]
[M3.A.07]
[B.I.c.3]
[I.B.2]
[M3.A.07]
[B.II.a.2]
[I.B.2]
[M3.A.08]
[A.II.b.1]
[I.B.2]
[M3.A.08]
[A.IV.b.2]
[I.B.2]
[M3.A.08]
[B.I.a.3]
[I.B.2]
[M3.A.08]
[B.I.c.3]
[I.B.2]
[M3.A.08]
[B.II.a.2]
[I.B.2]
[M3.A.09]
[A.II.b.1]
[I.B.2]
[M3.A.09]
[A.IV.b.2]
[I.B.2]
[M3.A.09]
[B.I.c.3]
[I.B.2]
[M3.A.09]
[B.II.a.2]
[I.B.2]
[M3.A.10]
[A.II.b.1]
[I.B.2]
[M3.A.10]
[A.IV.b.2]
