The use of dynamic modeling methods to create an adaptive training system for specialists that meets modern demands in the information field

Objective . The purpose of the research is to analyze the functionality and features of dynamic modeling as part of training specialists in the field of information security and countering various threats in the information space, taking into account the time factor. Method . The analysis of modelin...

Full description

Saved in:
Bibliographic Details
Published in:Vestnik Dagestanskogo gosudarstvennogo tehničeskogo universiteta. Tehničeskie nauki (Online) Vol. 51; no. 2; pp. 83 - 90
Main Authors: Konakov, A. M., Livshits, I. I.
Format: Journal Article
Language:English
Russian
Published: Dagestan State Technical University 25-07-2024
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Objective . The purpose of the research is to analyze the functionality and features of dynamic modeling as part of training specialists in the field of information security and countering various threats in the information space, taking into account the time factor. Method . The analysis of modeling the basic scenario of incidents and threats to information security, which are the initial data for the formation of the necessary level and requirements for the training of information security specialists, is carried out. Result . A new approach to training specialists in the field of information security has been developed and proposed, taking into account modern needs and requirements. The proposed approach introduces a numerical coefficient that allows us to determine the area of necessary skills and knowledge to prevent and minimize possible incidents over a period of time. Conclusion . The area of information security under consideration, namely the training of qualified specialists with the necessary level of knowledge and skills, is relevant from the point of view of the development of the information technology sector and ensuring the protection of all processes occurring in it. This area requires further attention and the introduction of new approaches and methods of training due to the development of the information society and the need for highly qualified personnel.
ISSN:2073-6185
2542-095X
DOI:10.21822/2073-6185-2024-51-2-83-90