. , , ,

,,,

.. , , ..

. . , , . . , . , , , - [1].

.

: , . . , ?. . , - ?. . , - , , , ? [2].

. , [3].

:

1 ?

2 , ?

3 ?

.

:

1 . , . , .

2 . , . , , .

3 . , . - .

4 . . . - 58 . , .

A. , [4].

:

?

?

?

?

?

, , . , , .

B. ? , - .

:

, .

, , .

.

.

.

.

.

, . . . , , .

C. , , . . . , , .

D. ?

:

.

59 .

.

[5]. , , , , , . , .

. , ?

. , , . , . , , , .

1. Geer D., Hoo K., Jaquith A. Information Security: Why the Future Belongs to the Quants / IEEE Security & Privacy Vol. 1, No. 4; July/August 2003, pp. 24-32.

2. Bishop M. What Is Computer Security? / IEEE Security & Privacy Vol. 1, No. 1; January/February 2003, pp. 67-69.

3. Boehm B., Turner R. Using Risk to Balance Agile and Plan-Driven Methods / IEEE Computer Vol. 36, No. 6; June 2003, pp. 57-66.

4. Geer D. Risk Management Is Still Where the Money Is / IEEE Computer Vol. 36, No. 12; December 2003, pp. 129-131.

5. Gliedman C. Managing IT Risk with Portfolio Management Thinking / CIO (Analyst Corner),www.cio.com/analyst/012502_giga.html.

http://www.contrterror.tsure.ru/



.. , , .. .

 

 

 

! , , , .
. , :