scholarly journals Basics of Adaptive Information Security Systems

2019 ◽  
pp. 11-15 ◽  
Author(s):  
Anastasia Kalita ◽  
Marina Ozhiganova ◽  
Evgeny Tishchenko

Over the past few decades, there has been a tendency to minimize the participation of the human factor in various production and other processes. This process is implemented through the mass introduction of automated systems. Man-machine complexes are currently the most common and productive model of activity. At the current stage of technology development, the process of human activity automation is only an intermediate link on the way to excluding human intervention. This direction is the most relevant for systems that have a potential and real threat to human health and life (for example, manufacturing plants) or systems that are threatened by a person (for example, transport systems). The second group includes the sphere of information security. There is a need to move to the next level of excluding the human factor – introducing adaptive systems that will transfer the process of information protection in a completely different plane. The organization of adaptive information security systems is based on applying existing methods of adaptation from other areas of scientific knowledge in relation to information security issues. Features of such application of the generalized principles of adaptation reflect the specifics of the subject area without violating generally accepted norms. This article discusses the general principles of adaptive systems. It investigates the existing approaches to the organization of adaptive information security systems as well.

2020 ◽  
pp. 12-21
Author(s):  
Marina Ozhiganova ◽  
Anastasia Kalita ◽  
Yevgeny Tishchenko

Over the past few decades, there has been a tendency to minimize the participation of the human factor in various production and other processes. This process is implemented through the mass introduction of automated systems (as). Human-machine complexes are currently the most common and productive model of activity. At the current stage of technology development, the process of automating human activity is only an intermediate link on the way to eliminating human intervention. This area is most relevant for systems that pose a potential and real threat to human health and life (for example, manufacturing plants) or systems that are threatened by humans (for example, transport systems). The second group includes the sphere of information security. The paper considers the basics of the organization of adaptive information protection systems, their application areas for information protection and methods of building models of adaptive information protection systems in the context of their application for protection against leakage through technical channels. The authors propose a generalized model of the adaptive information protection system against leakage through technical channels.


2020 ◽  
Vol 14 (2) ◽  
pp. 95-105
Author(s):  
NANANCHA AFIFI IGBOKWE ◽  

Background: The intraerythrocytic concentrations of ions (Na+, K+, Cl- and HCO3-) play key roles in maintaining erythrocyte volume homeostasis. Anisosmotic and isosomotic changes of these ion concentrations challenge erythrocyte volume to either shrink or swell, thereby sending signals to activate regulatory volume mechanisms that are mediated by ion transporters. Ion fluxes directed inwardly or outwardly with obliged water movements do restore the erythrocyte volume to its steady state. These physiological phenomena prevent the erythrocyte from becoming overhydrated or dehydrated with the consequence of intravascular haemolysis or senescent changes associated with eryptosis. Objectives: To review the literature on the physiological processes associated with transmembrane ion and water transports during erythrocyte volume homeostasis. Method: Offline and online libraries were searched with indexing tools using keywords derived from the subject area of review. Conclusions: The review has highlighted the physiological concepts involved in erythrocyte volume homeostasis in relation to the engaged transmembrane ion and water transport systems, which can influence experimental designs to study ion and water channel blockers and channelopathies of erythrocytes.


Author(s):  
V.V. Evstropov ◽  

The article examines the subject area of the enterprise associated with the formation of the teacher's rating, namely, the collection of the necessary data by the teacher and the compilation of tables on their activities based on them. The problems of the speed of collection and transformation of information, the infiuence of the human factor on the accuracy of the information provided are highlighted. The purpose of the study is to increase the teacher's efficiency by reducing the labor intensity of the annual reporting process and monitoring his scientific activities. All studies were carried out on the basis of an analysis of the literature on the topic of rules, requirements and regulations for compiling a teacher's rating, an analysis of the accompanying management documentation of universities on the rating assessment of teachers' activities. The result of the research is the solution of the discovered problems, by automating data collection using the api of electronic library services, or parsing them. The field of application of the results is the use of the proposed solution in higher educational institutions of Russia. As part of the application of the proposed solution, it was possible to reduce the amount of time required to collect information about teaching activities for the reporting period by at least thirty percent.


2021 ◽  
Vol 13 (3) ◽  
pp. 50-56
Author(s):  
Мaria Baran ◽  

. Information security as a subject of administrative and legal regulation is considered. The basic method of the research is a comprehensive system approach, on the basis of which a general and structural study of information security issues faced by the individual, society and the state is conducted. A comprehensive systematic approach is used by the basic method of the research, on the basis of which a general and structural study of information security issues faced by the individual, society and the state. The multifaceted nature of information and security determines the complexity, importance and relevance of the research on the problem from the point of view of the science of administrative and information law. The interrelation of national and information security, sources of threats to information security and ways of counteraction are revealed. It is established that as a subject of activity aimed at ensuring information security, it is necessary to consider a set of social relations regulated by legal support, the administrative and legal regulation of which depends on possible external influences. The subject area of administrative and legal regulation of information security has the following features: the inseparability of information relations or their conditionality; interconnectedness and interdependence of information relations with objects of national interests in the information sphere; the relationship of administrative and legal regulation of information security, taking into account the emergence, detection and prevention of threats to national interests in the information sphere in order to develop and apply mechanisms to effectively combat threats. Information security activities are expressed in administrative and legal regulation, the subject orientation of which is determined by a set of public relations in the information sphere, aimed at strengthening equal strategic partnership in the field of information security with NATO and the EU, protection of Ukraine’s sovereignty in the information space.


2020 ◽  
Vol 32 (5) ◽  
pp. 131-142
Author(s):  
Maria A. Poltavtseva

Monitoring of industrial cyber-physical systems (CPS) is an ongoing process necessary to ensure their security. The effectiveness of information security monitoring depends on the quality and speed of collection, processing, and analyzing of heterogeneous CPS data. Today, there are many methods of analysis for solving security problems of distributed industrial CPS. These methods have different requirements for the input data characteristics, but there are common features in them due to the subject area. The work is devoted to preliminary data processing for the security monitoring of industrial CPS in modern conditions. The general architecture defines the use of aggregation and normalization methods for data preprocessing. The work includes the issue from the requirements for the preprocessing system, the specifics of the subject area, to the general architecture and specific methods of multidimensional data aggregation.


Author(s):  
Dmitry Levshun ◽  
Diana Gaifulina ◽  
Andrey Chechulin ◽  
Igor Kotenko

This paper is an analysis and systematization of modern research in the field of cyber-physical system information security. The problematic issues of information security of such systems are considered: «what is being attacked?», «who is attacking?», «why is someone attacking?», «how is someone attacking?» and «how to protect the system?». As an answer to the first question, the paper proposes a definition and classification of cyber-physical systems according to such criteria as complexity, connectivity, criticality and social aspect. As an answer to the second and the third questions, the paper describes a classification of attacker according to such criteria as type of access, method of access, intentions, knowledge and resources. As  an answer to the fourth question, the paper contains a classification of attack actions according to such criteria as subject and object, method of influence, prerequisites and consequences. As an answer to the fifth question, the paper proposes a classification of protection methods and security tools according to such criteria as principle of operation, object of protection and task to be solved. The scientific significance of the paper is systematization of a current state of the art in the subject area. The practical value of the paper is providing information about security issues that are specific to cyber-physical systems, which will allow one to develop, manage and use such systems in a more secure way.


2018 ◽  
Vol 187 (1) ◽  
pp. 105-118 ◽  
Author(s):  
Michal Palega ◽  
Marcin Knapinski

The current publication presents selected risks resulting from the involvement of the human factor. In the opinion of the authors of the paper, it is the human inclination to make mistakes, commit breaches and abuses that can generate losses and damages caused by disclosure, modification, destruction or loss of corporate data. Theoretical considerations on the subject matter have been enriched by the results of conducted empirical research. They answer the following question: What categories of information security threats are associated with the human factor.


2020 ◽  
Vol 44 (4) ◽  
Author(s):  
Yu. Yu. Maslova ◽  
◽  
I. M. Kushnir

The article considers the problems that may arise during the implementation and operation of information security systems without proper assessment of risks and possible shortcomings of direct technical solutions. Certain aspects of implementation, the most common problems and risks that may be due to the human factor.


2019 ◽  
Vol 1 (1) ◽  
pp. 132-140
Author(s):  
Michał Pałęga ◽  
Marcin Knapiński

AbstractThe strategic importance of information for the functioning of each economic entity forces entrepreneurs to properly protect them against loss, unauthorized disclosure or unauthorized modification. Hence, organizations build complex security systems taking into account state-of-the-art technical solutions, while belittling often the most important element, which is the human factor. It should be emphasized that it is the intentional or accidental actions of the human that can lead to the loss of information security. In addition, it is also the potential of human capabilities and skills can provide an effective defense against the failure or technical security.The article presents the basic stages of human resource management in the aspect of information security. Complementing these considerations will be the presentation and discussion of the results of surveys aimed at assessing the level of employee awareness in the area of information security.


2017 ◽  
Vol 5 (1) ◽  
pp. 8-15
Author(s):  
Sergii Hilgurt ◽  

The multi-pattern matching is a fundamental technique found in applications like a network intrusion detection system, anti-virus, anti-worms and other signature- based information security tools. Due to rising traffic rates, increasing number and sophistication of attacks and the collapse of Moore’s law, traditional software solutions can no longer keep up. Therefore, hardware approaches are frequently being used by developers to accelerate pattern matching. Reconfigurable FPGA-based devices, providing the flexibility of software and the near-ASIC performance, have become increasingly popular for this purpose. Hence, increasing the efficiency of reconfigurable information security tools is a scientific issue now. Many different approaches to constructing hardware matching circuits on FPGAs are known. The most widely used of them are based on discrete comparators, hash-functions and finite automata. Each approach possesses its own pros and cons. None of them still became the leading one. In this paper, a method to combine several different approaches to enforce their advantages has been developed. An analytical technique to quickly advance estimate the resource costs of each matching scheme without need to compile FPGA project has been proposed. It allows to apply optimization procedures to near-optimally split the set of pattern between different approaches in acceptable time.


Sign in / Sign up

Export Citation Format

Share Document