ALGORITHMS FOR QUANTITATIVE SECURITY ASSESSMENT OF AUTOMATED SYSTEMS BASED ON THE REQUIREMENTS

2016 ◽  
Vol 9 (1) ◽  
pp. 40-42 ◽  
Author(s):  
Никитин ◽  
A. Nikitin ◽  
Дровникова ◽  
I. Drovnikova ◽  
Рогозин ◽  
...  

Presents algorithms for calculating the quantitative criterion of security of the automated systems (AS) and the effectiveness of the systems of information protection from unauthorized access (GIS LMI) in these systems, implement early times-robotany mathematical model of identification and evaluation of quantitative criteria the AS security based on the requirements of GOST R ISO/IEC 15408-2-2013. Developed by algorithms are an integral part of the system is automatically bundled design (CAD) GIS LMI AC.

2018 ◽  
pp. 48-58
Author(s):  
I P Mikhnev ◽  
Nataliia Anatol'evna Sal'nikova ◽  
Irina Petrovna Medintseva

The monograph presents studies of information protection tools against unauthorized access to automated radionuclide spectrometry systems based on a scintillation gamma spectrometer. As a result of the conducted researches, the system's security indicators have been obtained, which allow to calculate and optimize the probability of damage from unauthorized access taking into account the operating time and the applied information protection means. The developed analytical estimations allow to calculate the upper and lower bounds of the probability of unauthorized access to confidential information at the design stages of automated systems.


Author(s):  
A. I. Tatarinov

With the help of the general and structurally-information schemes of remote control, an analysis was made in the course of which the requirements for protection against unauthorized access of the complex system were clarified and established. In the article structural features of the remote control system of mobile measuring points of rocket and space equipment are considered. These features are represented by the requirements for information protection, as well as the operating modes of this system. The list of these regimes was obtained as a result of studies of structural and functional schemes of a remote control system for mobile measuring points.


Author(s):  
V. Yeliseyev ◽  
O. Kovalev

The research article examines the issues of increasing the readiness and efficiency of the functioning of a single state civil protection system (SSСPS). Ensuring implementation of state policy in the field of civil protection is carried out by the SSСPS. The main objective of the SSСPS is to ensure the readiness of the central and local executive authorities, the forces and means subordinated to them for actions aimed at preventing and responding to man-made, natural, social and military emergencies. The most difficult regime of the functioning of the SSСPS - the regime of martial law (special period) is established in the event of armed aggression or the threat of an attack on the state. A feature of this mode is in a volume that sharply grows amount of emergencies, human and material losses. The article defines the quantitative criterion (indicator) of the level of functioning of the SSСPS, which enables to evaluate the functioning of the SSСPS with the given forces, means and time of the assessment of functioning. Mathematical model allows you to calculate how much and who should formations and units in order to provide a level of performance sufficient SSСPS (adopted) level for a given time and that should be performance units to ensure recovery operation SSСPS to a specified level.


2020 ◽  
Author(s):  
Yuriy Sychev

The textbook is developed in accordance with current standards at a high methodological level and can be used to study the following subjects: "Fundamentals of information security", "Information security", "information Protection", "threats to information security", "Malware", "Antivirus programs", "Technology for building secure automated systems". Meets the requirements of Federal state educational standards of higher education of the latest generation. The material presented in the textbook is tested in the classroom and is intended for students studying in the direction of training 10.03.01 "Information security" (bachelor's level). It can also be used in preparation for admission to the master's program.


Sign in / Sign up

Export Citation Format

Share Document