<?xml version="1.0" encoding="UTF-8"?>
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="JATS-archive-oasis-article1-4.xsd" article-type="research-article" dtd-version="1.4" xml:lang="ru">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Журнал Материалы МСНК "Студенческий научный форум 2026"</journal-title>
      </journal-title-group>
      <publisher>
        <publisher-name>Общество с ограниченной ответственностью "Издательский Дом "Академия Естествознания"</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">ART-993</article-id>
      <title-group>
        <article-title>ПРОЦЕСС УПРАВЛЕНИЯ РИСКАМИ И ИНВЕСТИЦИИ В КИБЕРБЕЗОПАСНОСТИ</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author" corresp="yes">
          <name-alternatives>
            <name xml:lang="ru">
              <surname>Ярошенко</surname>
              <given-names>Е. А.</given-names>
            </name>
          </name-alternatives>
          <name-alternatives>
            <name xml:lang="en">
              <surname>no</surname>
              <given-names>name</given-names>
            </name>
          </name-alternatives>
          <email>no@reply.com</email>
          <xref ref-type="aff" rid="affcc77b712"/>
        </contrib>
        <contrib contrib-type="author">
          <name-alternatives>
            <name xml:lang="ru">
              <surname>Мозговенко</surname>
              <given-names>А. А.</given-names>
            </name>
          </name-alternatives>
          <name-alternatives>
            <name xml:lang="en">
              <surname>no</surname>
              <given-names>name</given-names>
            </name>
          </name-alternatives>
          <email>ya@amozgovenko.ru</email>
          <xref ref-type="aff" rid="affcc77b712"/>
        </contrib>
      </contrib-group>
      <aff id="affcc77b712">
        <institution xml:lang="ru">ФГБОУ ВО «Мелитопольский государственный университет»</institution>
        <institution xml:lang="en">work</institution>
      </aff>
      <pub-date date-type="pub" iso-8601-date="2026-01-01">
        <day>01</day>
        <month>01</month>
        <year>2026</year>
      </pub-date>
      <issue>19</issue>
      <fpage>125</fpage>
      <lpage>128</lpage>
      <permissions>
        <license xlink:href="https://creativecommons.org/licenses/by/4.0/">
          <license-p>This is an open-access article distributed under the terms of the CC BY 4.0 license.</license-p>
        </license>
      </permissions>
      <self-uri content-type="url" hreflang="ru">https://publish2020.scienceforum.ru/ru/article/view?id=993</self-uri>
    </article-meta>
  </front>
  <back>
    <ref-list>
      <ref>
        <note>
          <p>1. Gartner Survey of Over 2,000 CIOs Reveals the Need for Enterprises to Embrace Business Composability in 2022, STAMFORD, Conn. Октябрь 18, 2021.</p>
        </note>
      </ref>
      <ref>
        <note>
          <p>2. Fülöp J. Introduction to decision making methods // BDEI-3 workshop, Washington, 2005. C. 1-15.</p>
        </note>
      </ref>
      <ref>
        <note>
          <p>3. Schatz D., Bashroush R. Economical valuation for information security investment: systematic literature review // Inf Syst Front 19, 2017. C. 1205-1228.</p>
        </note>
      </ref>
      <ref>
        <note>
          <p>4. Bodin L. D., Gordon L. A., Loeb M. P. Evaluating information security investments using the analytic hierarchy process // Communications of the ACM. 2005. № 48(2). C. 79-83.</p>
        </note>
      </ref>
      <ref>
        <note>
          <p>5. Arora A., Hall D., Piato C. A., Ramsey D., Telang R. Measuring the risk-based value of IT security solutions, 2004. Р. 35-42.</p>
        </note>
      </ref>
      <ref>
        <note>
          <p>6. Bojanc R., Jerman-Blažič B. An economic modelling approach to information security risk management // International Journal of Information Management. 2008. № 28(5). C. 413–422.</p>
        </note>
      </ref>
    </ref-list>
  </back>
</article>
