Complexity Assessment Eliminating the Risk of Transmission of Digital Information in Enterprise Networks
Lyudmila M. Gruzdeva (),
Nadezhda V. Kapustina (),
Nana A. Kobiashvili (),
Igor A. Lebedev () and
Konstantin A. Bogonosov ()
Additional contact information
Lyudmila M. Gruzdeva: Russian University of Transport
Nadezhda V. Kapustina: Russian University of Transport
Nana A. Kobiashvili: Moscow Polytechnic University
Igor A. Lebedev: Financial University under the Government of the Russian Federation
Konstantin A. Bogonosov: K.G. Razumovsky Moscow State University of Technologies and Management (the First Cossack University)
A chapter in Economic Issues of Social Entrepreneurship, 2021, pp 47-59 from Springer
Abstract:
Abstract The process of efficient operation in information protection systems of corporate digital data transmission networks, as well as the process of their modernization and design, cannot be carried out without analyzing the characteristics of malicious attack detection processes, the process of recovering network nodes that have been attacked, and the effective organization of activities to prevent the infection of information networks. The paper deals with the main problems of digital transmission risks in corporate networks and considers the directions of digital data protection in corporate networks in the process of data transfer. It also offers an algorithm estimation of the labor intensity of the elimination of harmful influences. The aim of the study is to develop a model for assessing the characteristics of the process of eliminating harmful influences, as well as the process of spreading malware in the network. The following research methods were used in the framework of the research: economic-mathematical, calculation-analytical, simulation, statistical and quantitative methods. As a result of the study, a mathematical model was developed based on the theory of mass service networks. The model developed by the authors may be used for performance evaluation purposes process eliminating harmful influences in a computer data network. Based on the presented mathematical model of the process of minimizing the malicious influences in the nodes of computer networks it is possible to identify certain characteristics of the malware distribution process.
Keywords: Malicious influence; Corporate data network; Data transmission risk; Information protection system; G30; G32; D80 (search for similar items in EconPapers)
Date: 2021
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-030-77291-8_5
Ordering information: This item can be ordered from
http://www.springer.com/9783030772918
DOI: 10.1007/978-3-030-77291-8_5
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().