The article describes the formalized representation and the mathematical statement the problem of evaluating the damage from the tresspassing in the automated system. The main directions of defining the input parameters to use such a model are presented.
automated system, unauthorized access, model, transaction
1. Zima V.M., Moldavyan A.A., Moldavyan N.A. Bezopasnost' global'nyh setevyh tehnologiy. 2-e izd. SPb.: BHV-Peterburg, 2003. 368 s.
2. Sistemnyy analiz i prinyatie resheniy / V.I. Antyuhov [i dr.]; pod red. V.S. Artamonova. SPb.: S.-Peterb. un-t GPS MChS Rossii, 2009. 389 c.