Library
|
Your profile |
Software systems and computational methods
Reference:
Sosnin Yu.V., Kulikov G.V., Nepomnyashchikh A.V.
A complex of mathematical models of configuration optimization for means of information security from unauthorized access
// Software systems and computational methods.
2015. ¹ 1.
P. 32-44.
URL: https://en.nbpublish.com/library_read_article.php?id=66218
Sosnin Yu.V., Kulikov G.V., Nepomnyashchikh A.V. A complex of mathematical models of configuration optimization for means of information security from unauthorized accessAbstract: The subject of study is the problem of formalized description of conflicts arising in the protection of information from unauthorized access, for more information on possible action potential enemy and their consequences for the benefit of the selection and implementation of the defense strategy of information in automated systems. The initial data are the list of objects of the automated system and the value of the processed information to them; a list of information security and their cost; a list of possible methods of implementing the threat of unauthorized access to information, cost and efficiency. The result is the most effective means of protection configuration information for each object with the estimates of the effectiveness and cost of its implementation. Methods used: game theory, probability theory, reliability theory, system analysis, the theory of the collection and processing of expert information. The application of the developed models of information security processes for optimum configuration of information security for which each option protection system is characterized by unique quantification of having a clear physical meaning (security measure), so it is possible to choose a specific embodiment of the object of protection of the automated system by the criterion of maximum security (with cost constraints) or minimum value (for fixed requirements for security). Furthermore, the optimization of the composition and structure of information protection system design and in changing the original data is not time-consuming. Keywords: evaluation of data protection, threats to information security, security risk management, modeling of information security, modeling of information threats, information security management, information protection, information security, unauthorized information exposure, criteria for data protection
This article can be downloaded freely in PDF format for reading. Download article
References
1. Chirov D.S., Tereshonok M.V., Elsukov B.A. Metod i algoritmy optimizatsii tekhnicheskikh kharakteristik kompleksov radiomonitoringa // T-Comm: Telekommunikatsii i transport. 2014. T. 8. ¹ 10. S. 88-92.
2. Chirov D.S. Metodicheskii podkhod k obosnovaniyu tekhnicheskikh kharakteristik kompleksov radiomonitoringa dlya resheniya zadach raspoznavaniya istochnikov radioizlucheniya // T-Comm: Telekommunikatsii i transport. 2011. T. 5. ¹ 11. S. 85-87. 3. Khar'kov V.P., Merkulov V.I. Formirovanie zadannoi konfiguratsii slozhnoi raspredelennoi sistemy upravleniya // Radiotekhnika. 2011. ¹ 6. S. 96-101. 4. Khar'kov V.P. Postroenie optimal'nykh algoritmov upravleniya nelineinymi dinamicheskimi sistemami // Innovatsii na osnove informatsionnykh i kommunikatsionnykh tekhnologii. 2013. T. 1. S. 278-281. 5. Fedorov M.V., Kalinin K.M., Bogomolov A.V., Stetsyuk A.N. Matematicheskaya model' avtomatizirovannogo kontrolya vypolneniya meropriyatii v organakh voennogo upravleniya // Informatsionno-izmeritel'nye i upravlyayushchie sistemy. 2011. T. 9. ¹ 5. S. 46-54. 6. Solov'ev S.V., Zatoka I.V., Eshchenko E.V. Pokazateli kachestva zashchishchennykh informatsionnykh sistem v oblasti tekhnicheskoi zashchity informatsii // Telekommunikatsii. 2012. ¹ 5. S. 24-30. 7. Ushakov I.B., Bogomolov A.V. Informatizatsiya programm personifitsirovannoi adaptatsionnoi meditsiny // Vestnik Rossiiskoi akademii meditsinskikh nauk. ¹5-6, 2014. S. 124-128. 8. Sizonenko A.B., Men'shikh V.V. Optimal'naya realizatsiya avtomatnoi modeli zashchishchennoi informatsionnoi sistemy putem predstavleniya logicheskikh funktsii polinomial'nymi formami // Informatsiya i bezopasnost'. 2012. T. 15. ¹ 2. S. 225-230. 9. Rudakov I.S., Rudakov S.V., Bogomolov A.V. Metodika identifikatsii vida zakona raspredeleniya parametrov pri provedeniya kontrolya sostoyaniya slozhnykh sistem // Informatsionno-izmeritel'nye i upravlyayushchie sistemy. 2007. T. 5. ¹ 1. S. 66-72. 10. Men'shikh V.V., Pastushkova E.A. Metody otsenki variantov prinyatiya reshenii v sistemakh upravleniya s funktsional'no izbytochnym naborom deistvii // Vestnik Voronezhskogo instituta MVD Rossii. 2014. ¹ 3. S. 48-57. 11. Men'shikh V.V., Koval'chuk A.A. Otsenki uyazvimosti i opasnosti rasprostraneniya ugroz informatsionnoi bezopasnosti v telekommunikatsionnykh sistemakh // Informatsionnaya bezopasnost' regionov. 2013. ¹ 2 (13). S. 17-22. 12. Maksimov I.B., Stolyar V.P., Bogomolov A.V. Prikladnaya teoriya informatsionnogo obespecheniya mediko-biologicheskikh issledovanii. M.: Binom, 2013. 312 s. 13. Kulikov G.V., Sosnin Yu.V., Nepomnyashchikh A.V., Nashchekin P.A. Modelirovanie protsessa zashchity informatsii pri realizatsii nesanktsionirovannogo dostupa k nei // Vestnik komp'yuternykh i informatsionnykh tekhnologii. 2014. ¹ 4 (118). S. 45-51. 14. Kulikov G.V., Nepomnyashchikh A.V., Sosnin Yu.V., Nashchekin P.A. Osobennosti tekhnologii dinamicheskoi zashchity informatsionnykh resursov avtomatizirovannykh sistem upravleniya // Voprosy zashchity informatsii. 2013. ¹ 4 (102). S. 39-44. 15. Kulikov G.V., Nepomnyashchikh A.V. Metodika otsenivaniya funktsional'nykh vozmozhnostei sistem obnaruzheniya vtorzhenii // Informatsionnye tekhnologii. 2006. ¹ 1. S. 31–36. 16. Kulikov G.V., Nepomnyashchikh A.V. Metod sostavleniya naibolee polnogo perechnya ugroz bezopasnosti informatsii avtomatizirovannoi sistemy // Bezopasnost' informatsionnykh tekhnologii. 2005. ¹ 1. S. 47-50. 17. Kukushkin Yu.A., Bogomolov A.V., Ushakov I.B. Matematicheskoe obespechenie otsenivaniya sostoyaniya material'nykh sistem // Informatsionnye tekhnologii. 2004. Prilozhenie k ¹ 7. 24 s. 18. Kolomiets L.V., Fedorov M.V., Bogomolov A.V., Merezhko A.N., Soldatov A.S., Esev A.A. Metod podderzhki prinyatiya reshenii po upravleniyu resursami pri ispytaniyakh aviatsionnoi tekhniki // Informatsionno-izmeritel'nye i upravlyayushchie sistemy. 2010. T. 8. ¹ 5. S. 38-40. 19. Zaguzov G.V. Administrativno-pravovye sredstva obespecheniya informatsionnoi bezopasnosti i zashchity informatsii v Rossiiskoi Federatsii // Administrativnoe i munitsipal'noe pravo.-2010.-5.-C. 44-47. 20. Kozlov V.E., Bogomolov A.V., Rudakov S.V., Olenchenko V.T. Matematicheskoe obespechenie obrabotki reitingovoi informatsii v zadachakh ekspertnogo otsenivaniya // Mir izmerenii. 2012. ¹ 9. S. 42-49. 21. Golosovskii M.S. Model' zhiznennogo tsikla razrabotki programmnogo obespecheniya v ramkakh nauchno-issledovatel'skikh rabot // Avtomatizatsiya i sovremennye tekhnologii. 2014. ¹ 1. S. 43-46. 22. Grusho A.A., Grusho N.A., Timonina E.E., Shorgin S.Ya. Bezopasnye arkhitektury raspredelennykh sistem // Sistemy i sredstva informatiki. 2014. ¹ 24. S. 18-31. 23. Vorob'ev A.A., Kulikov G.V., Nepomnyashchikh A.V. Otsenivanie zashchishchennosti avtomatizirovannykh sistem na osnove metodov teorii igr // Informatsionnye tekhnologii. 2007. Prilozhenie k ¹ 1. 24 s. 24. Vladimirova T.V. K sotsial'noi prirode ponyatiya «informatsionnaya bezopasnost'» // Voprosy bezopasnosti. 2013. ¹4. C. 78-95. DOI: 10.7256/2409-7543.2013.4.596. URL: http://www.e-notabene.ru/nb/article_596.html 25. Buslenko N.P. Modelirovanie slozhnykh sistem. M.: Nauka, 1978. 355 s. 26. Bogomolov A.V., Maistrov A.I. Tekhnologiya analiza sistemnykh prichinno-sledstvennykh svyazei na osnove diagramm Isikavy // Sistemnyi analiz v meditsine (SAM 2014): Materialy VIII mezhdunarodnoi nauchnoi konferentsii. Blagoveshchensk, 2014. S. 13-16. 27. Bogomolov A.V., Chuikov D.S., Zaporozhskii Yu.A. Sredstva obespecheniya bezopasnosti informatsii v sovremennykh avtomatizirovannykh sistemakh // Informatsionnye tekhnologii. 2003. ¹ 1. S.2-8. 28. Borodakii Yu.V., Vorob'ev A.A., Kulikov G.V., Nepomnyashchikh A.V. Otsenivanie zashchishchennosti ot informatsionnykh vozdeistvii avtomatizirovannykh sistem upravleniya: teoriya i praktika // Bezopasnost' informatsionnykh tekhnologii. 2005. ¹4. S. 61. 29. Shelkov A.B., Shul'ts V.L., Kul'ba V.V. Audit informatsionnoi bezopasnosti avtomatizirovannykh sistem upravleniya // Trendy i upravlenie. 2014. ¹4. C. 319-334. DOI: 10.7256/2307-9118.2014.4.10281. |