DEVELOPMENT OF SECURITY ANALYSIS ALGORITHMS IN THE ENTERPRISE CORPORATE NETWORK
Keywords:
network security, comparison algorithm, load-based algorithm, security domain, vulnerability analysis, corporate network.Abstract
This article suggests two main algorithms aimed at analyzing an enterprise's corporate network and increasing its security level – comparison (L-algorithm) and load-based algorithm. The comparison algorithm allows you to compare network objects based on their properties and break them down into security areas. On the other hand, the load-based algorithm quantifies the security characteristics of objects and groups them by vulnerability levels. Both algorithms are used in complex network security analysis and serve to increase the overall level of protection.
Downloads
References
Kubarenko A.S. Modernization of the enterprise's corporate computer network // Concept. - 2016. - T. 11. – S. 3131-3135.
Stolyarenko, A. V. Primenenie informatsionno-kommunicatsionnyx tekhnologii v deyatelnosti predpriyatiy turistskoy sfery / A.V. Stolyarenko, A.A. Danilchenko // Sovremennye nauchnye issledovaniya i innovatsii. – 2017. – No. 1.
Mukhin D.E., Stolyarenko A.V. Informatsionno-kommunicatsionnaya sreda turistskorekreatsionnogo predpriyatiya Kryma // Tavricheskiy nauchnyi obozrevatel. – 2017. – No. 1 (18).
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
All content published in the Journal of Applied Science and Social Science (JASSS) is protected by copyright. Authors retain the copyright to their work, and grant JASSS the right to publish the work under a Creative Commons Attribution License (CC BY). This license allows others to distribute, remix, adapt, and build upon the work, even commercially, as long as they credit the author(s) for the original creation.