Search in Medwell
 
 
Journal of Engineering and Applied Sciences
Year: 2017 | Volume: 12 | Issue: 6 SI | Page No.: 7776-7778
DOI: 10.36478/jeasci.2017.7776.7778  
Definition of the Method of Determination of the Violator of Information Security in Process of Modeling the Threats of Information Security in the Information Systems of Processing Personal Data
Roman Zhuk and Alexandra Vlasenko
 
Abstract: In the study, the researcher’s method is given and the criteria allowing determining the type and kind of the violator of information security listed as well as its potential in modeling information security threats in information systems for processing personal data.
 
How to cite this article:
Roman Zhuk and Alexandra Vlasenko, 2017. Definition of the Method of Determination of the Violator of Information Security in Process of Modeling the Threats of Information Security in the Information Systems of Processing Personal Data. Journal of Engineering and Applied Sciences, 12: 7776-7778.
DOI: 10.36478/jeasci.2017.7776.7778
URL: http://medwelljournals.com/abstract/?doi=jeasci.2017.7776.7778