employee
employee
student
Ranking is one of the important processes of professional activity of the employees of enterprises. On competent analytical skills of the staff depends the correctness of solving tasks, as well as their optimization. The above term should be considered as one of the types of typical optimization tasks. Everything complex is simple. The more optimization in the production processes, the greater the labor efficiency and rating of the enterprise at the world level. In the global community there is a problem of solving analytical and production tasks. It is connected with the shortage of highly qualified specialists. These tasks can be quite diverse. Information security, development of a mathematical method for solving the problem of information-analytical monitoring, genetic engineering, etc. All of the above topics belong to this kind of tasks. And even despite the availability of IT products from such giants as “Kasperskiy”, “Security Code”, ‘Infosecurity’, “Solar”, to this day there is still scientific research in the field of data analysis in the field of information security, where the methods of ranking, making a competent expert assessment of what is happening play a significant role. The scientific novelty of the study is as follows: 1) an improved method of ranking Windows OS software is developed; 2) a method of obtaining meta-data about Windows OS software is developed; 3) a method of document validation of non-relational database tables is developed; Work purpose Improving the efficiency of Windows OS software ranking methods by means of computational mathematics methods. Methodology The paper used such methods as: literal data reading (reading of string data with automatic recognition of data type with further reduction to it); interpolation (a mathematical method to restore the calculated function of a series); regression (a mathematical method to extract the dependence between input and output data). Results: an improved method for ranking the Windows OS software list has been developed. Practical implications The obtained results can be used by employees of various security services of our country, as well as ordinary state and commercial enterprises.
Data analysis, computational mathematics, ASD technology, information security, system administration, PowerShell programming language, Python programming language, data science
1. Rylenkov D. A. «Algoritm ranzhirovaniya ugroz informacionnoy bezopasnosti na osnove metoda analiza ierarhiy».
2. Chernyshev K. S. «Ranzhirovanie proektov informacionnoy bezopasnosti». Stat'ya opublikovana v zhurnale «Molodoy uchenyy», 2023, №44 (491), s. 30–34.
3. Lomazov V. A., Prokushev Ya. E. «Kriterii vybora sredstv obespecheniya informacionnoy bezopasnosti personal'nyh dannyh». Mezhdunarodnyy nauchno-issledovatel'skiy zhurnal, 2016, t. 4, №11, s. 84–85.
4. Bol'shakov A. S., Rakovskiy D. I. «Effektivnyy metod mnogokriterial'nogo analiza v oblasti informacionnoy bezopasnosti». Pravovaya informatika, 2020, №4, s. 55–66.
5. Pavlov I. P. «Algoritm ranzhirovaniya sobytiy bezopasnosti po prioritetnosti v avtomatizirovannoy sisteme v zaschischennom ispolnenii na osnove metoda analiza ierarhiy». Nauchnye trudy KubGTU, 2021, №4.