Methods and algorithms for the implementation of security monitoring in computer networks of automated process control systems.
Studies show that existing computer systems are often susceptible to various kinds of attacks by malicious software. Computer systems used to control and control technological processes are exposed to special dangers. Protecting confidential and valuable information processed in computer networks from unauthorized access and modification is designed to provide a solution to one of the most important tasks of protecting the property rights of computer owners and users - protecting property embodied in computer-processed information from all kinds of malicious attempts that could inflict significant economic and other material and non-material damage. Based on an analysis of existing approaches and algorithms for monitoring security, a new method is proposed for analyzing the risks of implementing threats to the security of information resources based on monitoring their conditions, which takes into account the goals of attackers, and groups their actions according to certain criteria.