The Model for Integration of Information Support Processes in the System of Monitoring the State of Technical Information Protection Using New Information Technologies

2005 ◽  
Vol 64 (2) ◽  
pp. 149-154
Author(s):  
A. V. Zhizhelev ◽  
S. V. Soloviev ◽  
S. V. Zhilinskii ◽  
S. A. Golovin
2005 ◽  
Vol 64 (3) ◽  
pp. 227-237
Author(s):  
A. V. Zhizhelev ◽  
S. V. Zhilinskii ◽  
A. V. Klyshevskii ◽  
S. A. Golovin

Author(s):  
Peter J. Smith ◽  
Elizabeth Smythe

Not long ago globalization had only one face, that of a restructured capitalist economy employing new information technologies to operate on a global scale (Castells, 2000). According to this interpretation of globalization, the global is represented as space dominated by the inexorable and homogenizing logic of global markets (Steger, 2002). In this neoliberal model, the market replaces the state and the individual, the community thus posing a bleak future for citizenship.


2021 ◽  
Vol 39 (6) ◽  
Author(s):  
Olena Yu. Sova ◽  
Liudmyla A. Kyslova ◽  
Liliia V Semkova ◽  
Lyudmila Yu. Krasavtceva ◽  
Tetiana B. Samonova

The development of the information sphere and the corresponding increase in its volume and cost is accompanied by the introduction of advanced information technologies in all spheres of public life of the state, which leads to an increase in the frequency of attacks and potential losses from information leakage. As a result, the complexity of protection systems and an increase in their cost. In these conditions, the task to efficiently distribute limited financial resources to protect the information of business entities becomes more and more important and largely determines the level of financial and economic security of the enterprise and the state as a whole. Of particular relevance is the development of issues of optimisation of indicators of the information security system in a dynamic confrontation. Such indicators can be the amount of damage caused from the implementation of information threats, which determines the effectiveness of the protection system, the profit from making investments in information protection, their profitability, and the like. It was established that it is necessary to determine the total amount of protection resources, which minimises the total losses from possible information leakage in conditions of instability. The authors believe that the optimal control mechanism is the distribution of resources between objects that contain a different share of information and are distinguished by natural security, dynamic vulnerability, and the probability of an attack with the allocation of a certain amount of resources. The practical significance of the study lies in determining the optimal moment for the introduction of defence resources – after the direction and intensity of attacks and, accordingly, the possible level of losses was clarified.


2021 ◽  
pp. 69-79
Author(s):  
Sergey Soloviov ◽  
◽  
Yuri Yazov ◽  

The goal of research is to determine the main areas for the development, composition and structure of methodological support for the construction and functioning of information provision systems for the organization and maintenance of technical protection of information in authorities, organizations and enterprises. The method of research is synthesis and analysis of the composition, and content of the tasks of technical protection of information, addressed in its organization, as well as the mathematical technique of factor analysis and theoretical and methodological basis of the cluster approach. As a result of the research, the tasks of technical protection of information, considered on the objects of informatization are defined and the timeliness of the application is shown for automated information support systems of the activity for the technical protection of information to solve these problems. It is noted that at present, the methodology for creating such systems is practically absent. The authors of research indicate the main approaches to their development, such as the dynamic change in the subject area of information security, the emergence of new information technologies, rapid changes in system and application software, the expansion of the range of information security threats, changes in the regulatory framework, etc. The composition and structure of the system of models and methodologies are proposed necessary for the design of these information support systems, their development, production, delivery and operation. Particular indicators are proposed to assess the completeness, reliability, timeliness (relevance) and information security necessary to ensure the activities to solve the problems of technical protection of information and complex indicator to assess the efficiency of information support for this activity. The interdependence of complex and particular indicators is shown by convolution of particular indicators using the linear function and the Cobb-Douglas function. Examples of calculating the complex indicator are given. The proposed indicators and models for their calculation will define quantitative requirements for the composition and structure of promising information support systems, as well as for the completeness, reliability, timeliness and security of the information provided by them, which is necessary for organizing the technical protection of information in domestic information systems.


The article discusses the problems of improving the information support of the units of the road patrol service of the state traffi c Inspectorate of the law enforcement agencies. It is noted that the strategy of reforming the road patrol service is aimed at reducing the number of staff, so the level of workload will increase. Due to this immediate measures are required to improve the activities of the mentioned units. The level of intensity of the employees of road patrol service’s work in the course of registration of materials connected with transport incidents is analyzed. It is proved that information is a key element of the complex of actions of police offi cers during the registration of materials on road traffi c incident. Improvement of the information circulation activities, including its transmission, processing and using, will signifi cantly reduce the time taken to register the materials connected with transport incidents. The necessity to introduce the hardware and software complexes of automated registration of road traffi c incidents is proved. The authors conclude that there is a need for MIA of Russia to issue a legal regulatory act on application of such hardware and software complexes by divisions of road patrol service of Inspectorate of the law enforcement.


2019 ◽  
Vol 125 ◽  
pp. 75-82
Author(s):  
Andrzej Lewiński ◽  
Tomasz Perzyński ◽  
Magdalena Piwko

The article presents how of wagons and the train equipped with new information technologies allows to reduce the queues and time of in/out charging. It has been indicated that this allows significantly decreasing the probability of being in the state connected with time of waiting for unloading (queue) especially after case of disturbance caused by random events, including environmental conditions, weather conditions or failures.


2018 ◽  
Vol 13 (2) ◽  
pp. 211-232 ◽  
Author(s):  
Alexei Tsinovoi ◽  
Rebecca Adler-Nissen

Summary The concept of ‘duty of care’ for citizens abroad is grounded in a political rationality where the population is seen as an object for protection by the state. In today’s globalised world, however, this rationality is challenged by increased citizen mobility, budget cuts, new information technologies and the proliferation of new security threats. In recent years the state’s duty of care has received fresh political and scholarly attention, but Diplomatic Studies have so far overlooked how the recent waves of neoliberal reforms have introduced a new political rationality into policy-making circles, where the population is not seen only as an object for protection, but also as a resource for mobilisation. Developing insights from studies of governmentality, this article argues that when this neoliberal political rationality becomes predominant in diplomatic circles, it leads to inversion of the duty of care through new citizen-based practices, steered at a distance by the state.


Author(s):  
Mugesh Ravi ◽  

This analysis reviews the management of vulnerabilities and security risks of Internet of Things (IoT). This paper provides an overview, which it reveals the recent Internet's growth and how it has transformed our lives in various, unforeseen dimensions and how it has given rise to IoT. The introduction part focuses on providing an analysis on literature by presenting a short IoT history, some technical information on security protocols, and IoT hardware problems. The section on survey is where similar literatures on specific concepts are reviewed by describing the vulnerabilities and threats of IoT systems, and then reviewed risk management mechanisms for both information technologies and information protection. After the review, the analysis and discussion segment addressed and evaluated the details contained in the literature review. In this paper, a new risk management strategy uniquely designed for each IoT system is proposed. Then proposed work is evaluated by discussing the advantages and concluded the analysis and the future work.


2021 ◽  
Vol 7 (3D) ◽  
pp. 511-520
Author(s):  
Aislu R. Abdulkhakova ◽  
Guzela M. Kormishina ◽  
Olga A. Kaleginа ◽  
Galina V. Matveeva ◽  
Ludmila E. Savich ◽  
...  

The article describes the results of the study of information needs of students in the formation of the electronic educational environment of the Kazan State Institute of Culture.  The study aims to solve the following problems: identify and evaluate the attitude of students to the use of new information technologies in the educational process; define the range of sources of information used by students; to evaluate the degree and effectiveness of using various elements of the electronic educational environment of the institute. The methodological base of the study was a systematic approach as a direction of the methodology of scientific knowledge, which is based on the consideration of the object of study as a system. This study uses empirical research methods, in particular survey and comparison methods, as well as analysis of publications and regulatory documents. Studying the information needs of students to optimize their information support system, intensify their activities in mastering the basic educational program and improve the quality of training of future specialists.


2021 ◽  
Vol 14 (3) ◽  
pp. 67-73
Author(s):  
Valeriy Suhanov ◽  
Oleg Lankin

One of the most promising new information technologies is analytical databases that allow us to analyze the dynamics of the behavior of the control object in the historical aspect. The introduction of analytical databases increases the efficiency of information systems. In particular, one of the criteria for effectiveness is the security of an information system, on which analytical databases have a fairly significant impact, which at first glance is not obvious. In the material of this article, the problems of organizing and implementing security in analytical databases will be considered, as well as the method of logical design of information support for distributed information systems of critical application under the prism of ensuring the security of this system.


Sign in / Sign up

Export Citation Format

Share Document