On Evaluation of Information Vulnerability in the Requirements to Information Protection Facilities in Automated Systems

2005 ◽  
Vol 63 (3) ◽  
pp. 215-220
Author(s):  
E. A. Rogozin ◽  
Yu. E. Didyuk ◽  
V. S. Lutikov ◽  
O. Yu. Makarov
2018 ◽  
pp. 48-58
Author(s):  
I P Mikhnev ◽  
Nataliia Anatol'evna Sal'nikova ◽  
Irina Petrovna Medintseva

The monograph presents studies of information protection tools against unauthorized access to automated radionuclide spectrometry systems based on a scintillation gamma spectrometer. As a result of the conducted researches, the system's security indicators have been obtained, which allow to calculate and optimize the probability of damage from unauthorized access taking into account the operating time and the applied information protection means. The developed analytical estimations allow to calculate the upper and lower bounds of the probability of unauthorized access to confidential information at the design stages of automated systems.


2020 ◽  
Author(s):  
Yuriy Sychev

The textbook is developed in accordance with current standards at a high methodological level and can be used to study the following subjects: "Fundamentals of information security", "Information security", "information Protection", "threats to information security", "Malware", "Antivirus programs", "Technology for building secure automated systems". Meets the requirements of Federal state educational standards of higher education of the latest generation. The material presented in the textbook is tested in the classroom and is intended for students studying in the direction of training 10.03.01 "Information security" (bachelor's level). It can also be used in preparation for admission to the master's program.


2016 ◽  
Vol 9 (1) ◽  
pp. 40-42 ◽  
Author(s):  
Никитин ◽  
A. Nikitin ◽  
Дровникова ◽  
I. Drovnikova ◽  
Рогозин ◽  
...  

Presents algorithms for calculating the quantitative criterion of security of the automated systems (AS) and the effectiveness of the systems of information protection from unauthorized access (GIS LMI) in these systems, implement early times-robotany mathematical model of identification and evaluation of quantitative criteria the AS security based on the requirements of GOST R ISO/IEC 15408-2-2013. Developed by algorithms are an integral part of the system is automatically bundled design (CAD) GIS LMI AC.


Author(s):  
I. G. Drovnikova ◽  
Е. S. Ovchinnikova ◽  
V. V. Konobeevsky

Abstract. Aim Important contemporary trends in the theory and functional practice of secure automated systems at informatisation facilities of internal affairs bodies include an increase in the number of threats realised through remote unauthorised access (network attacks) on confidential in-formation resources, as well as the increasing complexity of implementing mechanisms aimed at providing protection from such attacks. In order to increase the effectiveness of existing and prospective automated security systems at the informatisation facilities of internal affairs bodies, it is necessary to identify and analyse typical network attacks aimed at components and software comprising these systems.Method. The method for solving this problem consists in a comprehensive analysis of the process of implementing network attacks on automated systems when they are used in secure mode in the informatisation facilities of internal affairs bodies.Results. Based on the analysis of information held in the security threat database developed by the Russian Federal Service for Technical and Export Control (FSTEC), modern features and operations of secure automated systems on the informatisation facilities of bodies of internal affairs and the results of a survey of experts in the field of information protection of allocated in accordance with the classification typology, eight types of dan-gerous attacks on automated systems of the internal affairs bodies are described taking into account their sources, objects, effects and possible consequences of implementation.Conclusion. The presented results are of use in further studies to conduct a quantitative assessment of the danger of typical attacks and for developing a private model of actual attacks for a specific automated system, taking into account their functional features in secure mode operations at the informatisation facility of the internal affairs body.


1996 ◽  
Vol 26 (12) ◽  
pp. 1420-1427 ◽  
Author(s):  
T. BRUNNEE ◽  
A. SEEBERGER ◽  
J. KLEINE-TEBBE ◽  
G. KUNKEL

2020 ◽  
Vol 10 (2) ◽  
pp. 27-35
Author(s):  
Suhyeon Kim ◽  
Sumin Kang ◽  
Jaein Yoo ◽  
Gahyeon Lee ◽  
Hyojeong Yi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document