Detailed information security threat models (ITTs) allow you to develop a defense
plan that is based on current threats and will consider effective countermeasures that
increase the level of information security (IS). One of the main purposes of modeling
is to create the most effective system for assessing the state of security enterprise
assets. The following article is devoted to the algorithms of risk minimization in
personal data protection systems.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright (c) 2022 Nigmatkhojayev Fayzulla