@ARTICLE{Akhmetov_Berik_Automation_2022, author={Akhmetov, Berik and Lakhno, Valerii and Chubaievskyi, Vitalyi and Kaminskyi, Serhii and Adilzhanova, Saltanat and Ydyryshbayeva, Moldir}, volume={vol. 68}, number={No 3}, journal={International Journal of Electronics and Telecommunications}, pages={549-555}, howpublished={online}, year={2022}, publisher={Polish Academy of Sciences Committee of Electronics and Telecommunications}, abstract={An information security audit method (ISA) for a distributed computer network (DCN) of an informatization object (OBI) has been developed. Proposed method is based on the ISA procedures automation by using Bayesian networks (BN) and artificial neural networks (ANN) to assess the risks. It was shown that such a combination of BN and ANN makes it possible to quickly determine the actual risks for OBI information security (IS). At the same time, data from sensors of various hardware and software information security means (ISM) in the OBI DCS segments are used as the initial information. It was shown that the automation of ISA procedures based on the use of BN and ANN allows the DCN IS administrator to respond dynamically to threats in a real time manner, to promptly select effective countermeasures to protect the DCS.}, type={Article}, title={Automation of Information Security Risk Assessment}, URL={http://journals.pan.pl/Content/124265/PDF-MASTER/13-3600-12086-1-PB.pdf}, doi={10.24425/ijet.2022.141273}, keywords={information security, audit, Bayesian network, artificial neural networks}, }