The process of ensuring information security is inextricably linked with the assessment of compliance with the requirements. In the field of information protection, this process is called an information security audit. Currently, there are many international and domestic audit standards that describe various processes and methods for assessing compliance with requirements. One of the key drawbacks of these standards is the use of exclusively qualitative assessment without numerical calculations, which in turn does not allow making the procedure the most objective. The use of fuzzy logic allows providing the audit process with an appropriate quantitative assessment, while operating with understandable linguistic variables. The article analyzes existing standards and presents a conceptual model for applying the fuzzy set method in the process of information security audit.
Keywords: information security, information infrastructure, security audit, risk analysis, fuzzy sets, fuzzy logic
Currently, one of the most extensive issues in the field of information security is the organization of user access control to information infrastructure objects. Taking into account the volume of corporate information resources, as well as the number of users requesting access, there is a need to automate the access approval process taking into account possible risks. In this case, the most optimal solution to this problem is the use of fuzzy logic. The article analyzes the process of providing access to the information infrastructure using a fuzzy classifier and develops a conceptual model of the fuzzy classifier algorithm for incoming requests for access in order to automate the process and minimize information security risks associated with possible destructive actions aimed at the confidentiality, integrity and availability of the information infrastructure.
Keywords: neural network, machine learning, information security, cybersecurity, properties and structure of a neural network, mathematical model, threats and information vulnerabilities