Choosing an Information Protection System Taking into Account the Company Competitiveness

2016 ◽  
Vol 6 (85) ◽  
pp. 85-90
Author(s):  
E. V. Popova ◽  
2021 ◽  
Vol 45 (1) ◽  
Author(s):  
V. A. Savchenko ◽  
◽  
V. M. Akhramovych ◽  
T. M. Dzyuba ◽  
S. O. Laptіev ◽  
...  

The elements of user interaction in social networks are considered: it is shown that the method of analysis of user interactions is based on assumptions when the magnitude of the influence depends on the centrality of users in the social network; the greater the consonance, the higher the nature of the influence, the interaction is a nonlinear function; it is indicated that interaction is a process that has a time interval, the linear model of protection of the information protection system from user interaction is considered; the obtained equations of protection are the equation of a harmonic oscillator with damping amplitude, the iteration of oscillations of the protection system in the pre-resonant, resonant and post-resonant zones is shown.


Author(s):  
A. M. Kadnova

Objectives At present, in accordance with the requirements of the guiding documents of the Federal Service for Technical and Export Control (FSTEC) of Russia, as well as international standards in the development and operation of protected automated systems, it is necessary to evaluate the effectiveness (general utility) of information protection systems. The article is devoted to the development of a method for assessing the ergotechnical characteristics of software information security systems for use the assessment of the general utility of such systems. The aim of the work is to develop a methodology for assessing the probabilistic indicator of the timeliness of typical operations for the administration of information security systems.Method To achieve this goal, user groups were created in order to perform typical administrative operations within the information protection system. The operation time for each group, recorded using the IOGraphV1.0.1 tool, was utilised to calculate the probabilities of timely execution of typical operations by the administrator according to a truncated normal distribution formula.Results An assessment of a probabilistic indicator was carried out in order to evaluate the timeliness of operations performed by the administrator of the information protection system.Conclusion The results can be used in a comprehensive assessment of the effectiveness (reliability) of the automated functioning of information security software systems when modelling and analysing the security of special-purpose informatisation facilities.


2019 ◽  
Vol 1333 ◽  
pp. 032073
Author(s):  
N Y Saigushev ◽  
O A Vedeneeva ◽  
Yu B Melekhova ◽  
L S Ryazanova ◽  
M V Konovalov

2016 ◽  
Vol 20 (6) ◽  
pp. 875-884 ◽  
Author(s):  
Weizhe Zhang ◽  
Xiong Li ◽  
Naixue Xiong ◽  
Athanasios V. Vasilakos

Sign in / Sign up

Export Citation Format

Share Document