scholarly journals Investigation of the Application of Software Generator of the Speech–Like Interference to Protect Acoustic Information from Leakage through an Acoustic Channel

2021 ◽  
Vol 2131 (2) ◽  
pp. 022091
Author(s):  
D A Korochentsev ◽  
L V Cherckesova ◽  
E A Revyakina ◽  
R A Goncharov

Abstract This work is aimed at developing a software tool for generating speech-like interference, which allows you to hide protected information from persons who do not have access to it. In the course of the work, the analysis of acoustic channels of information leakage was carried out, the choice of the stack of technologies used in the development of the software tool was justified. The developed software was tested with various types of speech-like interference, during which the type of interference used to protect information was determined.

Author(s):  
Denys Bakhtiiarov ◽  
Oleksandr Lavrynenko ◽  
Nataliia Lishchynovska ◽  
Ivan Basiuk ◽  
Tetiana Prykhodko

Methods for synthesis a structural diagram of the processes for detecting and locating technical information leakage channels are analysed. Software for defining a controlled room zone was also presented. A proprietary approach to search the electromagnetic environment under radio interference has been developed to detect devices for unauthorized control of acoustic information using microphones and transmission of this information using a radio channel.


2019 ◽  
Vol 11 (4) ◽  
pp. 35-40
Author(s):  
Владимир Зольников ◽  
Vladimir Zolnikov ◽  
Александр Фомичев ◽  
Aleksandr Fomichev

2021 ◽  
Vol 12 (4) ◽  
pp. 117-131
Author(s):  
Volodymyr Astapenia ◽  
Maksym Martseniuk ◽  
Svitlana Shevchenko ◽  
Pavlo Skladannyi ◽  
Yevhen Martseniuk

In the digital stage of world development, information is constantly expanding its facets. That is why the exchange of information is a leading component of constant change in life. Although humanity is gradually moving to the use of electronic technology, acoustic information still plays a key role in information circulation. This applies to official communication in public institutions up to the highest level, business contacts in commercial structures and private communication between people. The process of transmitting information in acoustic form has dangerous consequences. The use of appropriate devices, such as directional acoustic microphones or technical intelligence acoustic antennas, which may be outside the scope of the information activity, makes it possible to obtain unauthorized information that should not reach third parties. Therefore, the task of detecting and protecting information leakage channels, including acoustic ones, is gaining a new degree of importance every day. The protection of the premises or building, where acoustic information regularly circulates, provides a set of organizational and technical measures and means of protection of information circulation, taking into account the peculiarities of the location and arrangement of the object. This study involves the study of the dependence of the level of the acoustic signal on ways to prevent leakage of information through the acoustic channel, which includes vibration noise by means of technical protection and coverage of improvised materials (shielding) of enclosing structures of information activities (OID). The experiment determines the degree of influence of density, sound-absorbing properties of materials and their combinations on acoustic oscillations, the source of which is in the OID. The object of the study was a basic room, where the enclosing structures are walls with windows and doors, ceiling and floor. It is also worth noting that the acoustic signal measurements were not performed in complete silence, which directly affected the accuracy of the results. This step was taken in order to best reproduce the conditions in which criminals often work.


2020 ◽  
Vol 224 ◽  
pp. 01042
Author(s):  
D Korochentsev ◽  
L Cherckesova ◽  
P Razumov

The article considers the physical basis for the formation of a technical channel of information leakage that occurs due to low-frequency acoustoelectric transformations. The method of instrumental and computational control of the security of speech information in the considered channel of information leakage, which is currently used in special research, is presented with a representation in the form of a simulation model. Based on the developed simulation model, using the MVR design pattern, a software tool was developed. The main classes of software that implements the model are presented. The functionality of the developed software tool is demonstrated and recommendations are given for the possible use of a simulation model for identifying threats to information security that occur due to low – frequency acoustoelectric transformations.


Author(s):  
E. A. Rogozin ◽  
D. G. Silka ◽  
O. A. Gulyaev

Objectives. In order to determine the security of a special-purpose informatisation object, it is necessary to calculate the effectiveness indicators of information security (IS) measures aimed at preventing unauthorised access (UA) threats associated with information leakage through technical (acoustic) channels. In order to determine the actual channels of information leakage, it is necessary to develop a list of actions to neutralise potential threats, including the development of an information protection system for a special-purpose informatisation object.Method. A security assessment of the special-purpose informatisation object is carried out using expert documentary and instrumental methods.Results. The results of evaluating the indicators of protection against information leakage through the air (acoustic) channel are presented and aspects of improving special measures for protecting information at the special-purpose informatisation object are identified.Conclusion. Due to its relevance, the direction of this study requires further development of organisational and technical measures to implement the requirements of regulatory documents on the protection of information in special-purpose informatisation objects. 


Sign in / Sign up

Export Citation Format

Share Document