INFORMATION SECURITY AND NOISE IMMUNITY OF TELECOMMUNICATION SYSTEMS UNDER CONDITIONS OF VARIOUS INTERNAL AND EXTERNAL IMPACTS

2017 ◽  
Vol 76 (19) ◽  
pp. 1705-1717 ◽  
Author(s):  
I. D. Gorbenko ◽  
А. А. Zamula ◽  
V. L. Morozov
Author(s):  
O. V. Samchyshyn ◽  
D. V. Perevizna

Emergence of new technologies and modernization of existing information technologies, development of information and telecommunication processing and storage systems have increase the level of information security, necessitating an increase of information security’s effectiveness with the complexity of data storage architecture. Security of information from unauthorized access is an essential measure to prevent material and non-material damage to its owner. So it is very important to take into account the efficiency of the subsystem of access control and data security in order to ensure security of some information system. Accordingly the threat of information leakage has made the means of information security and cyber security one of the mandatory characteristics of information and telecommunication systems and information security has become an integral part of professional function. Under conditions of the hybrid war of the Russian Federation against Ukraine? the number of cyber attacks on military information and telecommunication systems has increased. At the same time their technological complexity has increased too. This process necessitates the improvement of information security systems and the process of providing access to them by using modern types of users identification. Access control is an effective method of information security. It regulates the use of information system resources. User’s identification is an important and integral element of access control system. An analysis of modern types of users identification is presented in the paper. The technology of QR-code is considered: the principle of formation, the types of coding, the structure of elements, the advantages of its usage. The interconnection between its components was established. Prospects for further research are the development of an algorithm and software application for user identification to provide access by QR-code to information and telecommunication systems for military purposes.


Radiotekhnika ◽  
2020 ◽  
pp. 91-96
Author(s):  
R.Y. Gvozdov ◽  
R.V. Oliynykov

The aim of the article is to develop a methodology for the formal design of the complex information security system in information and telecommunication systems. At the moment, there are no methods for the formal design of complex information security system in information and telecommunication systems, so the development of such a methodology is an urgent task. The article discusses the methods of formalized modeling of information security policy and methods of formalized description of the information and telecommunications system and information processing processes. The necessity of formal design of complex information security system is substantiated and the requirements for the development of formal descriptions of an integrated information security system in accordance with regulatory documents in the field of technical protection of information are described. The comparative characteristics of the methods of formalized modeling of information security policy and methods of formalized description of the information and telecommunication system and information processing processes are given. As a result of the comparison, it is proposed to use the UML method for the formal description of the information-telecommunication system, and the UMLsec method for the security policy modeling. An algorithm for the formation of a complex of protection facilities in an information and telecommunications system is proposed from a formal model of security policy and from a formalized description of an information and telecommunications system and information processing processes.


Author(s):  
Oksana Yu. Lavlinskaya ◽  
Oksana V. Kuripta ◽  
Felix A. Desyatirikov

2014 ◽  
Vol 11 (Spl Edition Nov. 14) ◽  
pp. 277-279 ◽  
Author(s):  
Vladimir Mikhailovich Artyushenko ◽  
Tatyana Sergeevna Abbasova

Radiotekhnika ◽  
2021 ◽  
pp. 25-32
Author(s):  
I.D. Gorbenko ◽  
A.A. Zamula

Methods for information exchange, formation and processing of data used in information and communication systems (ICS), as well as classes of broadband signals used as a physical data carrier, do not provide the necessary (for individual ICS applications) indicators of cyber and information security, noise immunity of reception signals and secrecy of IKS functioning. Most of the existing systems use signals, the construction of which is based on linear laws, which allows an attacker, based on the establishment of the parameters of the signals used in the system, to carry out deliberate interference in the operation of the ICS with minimal energy consumption. The article presents conceptual approaches to the construction of secure ICS, which determine the need to cover the entire spectrum of information transformations in the complex, and based on the synthesis of signal systems with improved ensemble, correlation, structural properties. A method is proposed for synthesizing discrete derivatives of signals based on nonlinear discrete complex cryptographic signals (CS) and orthogonal signals formed on the basis of the rows of the Hadamard matrix (initial signals),. Based on computer modeling and the performed calculations, it is shown that the derivative signals formed on the basis of cryptographic sequences and rows of the Hadamard matrix have improved properties compared to orthogonal and linear classes of signals. Approaches to the construction are stated and a general characteristic of the hardware-software complex for synthesis, analysis, study of properties, generation, processing of a number of studied signal classes is given. It is shown that the use of such signals will improve such indicators of the system functioning as information security, noise immunity of signal reception and secrecy of functioning.


Author(s):  
O. G. Maslov ◽  
◽  
O. V. Kitura

Ways of unauthorized receipt of information in information and telecommunication systems are shown. The three stages of the process of preventing or reducing the risks of dangers in information and telecommunication systems are shown. Threats to information security in information and telecommunication systems and their classification are considered. Methods and technologies for counteracting information threats in information and telecommunication systems are given. The conclusion is made about the need to monitor new technological solutions to ensure information security in information and telecommunication systems.


Author(s):  
Turgut Salaev

In the article certain issues of international experience in ensuring information security are investigated through the use of comparativeanalysis. The main tendencies and priorities of the legal regulation of information security in the European Union, particularlyin Germany and Poland are defined. Also significant accents in the development of customs legislation of leading foreign countries are identified as well. These issues are primarily related to the development of automated systems of customs authorities and the prolife -ration of the use of information and telecommunication technologies in the implementation of state customs procedures. It is noted thatthese tendecies make it necessary to simultaneously ensure an adequate level of information security of the customs authorities of fo -reign countries. The author proposed some ways to improve the administrative and legal support of information security in the customsfield, taking into account international experience.It is noted that the customs are one of those areas of social and political life and legal regulation, which should be mostly correlatedwith international experience in the development of the corresponding sphere, with leading international legal tendencies in theorganization and implementation of customs, as well as ensuring information security in the mentioned field. Taking into account allthe mentioned below, we need to say that the experience of international legal support of information security in the customs sphereneeds to be comprehensively studied, it is necessary to systematize and formulate strategic directions for further improvement of thenational information security system, taking into account such progressive provisions.In the context of achieving this task, it is proposed, for example, to provide clear regulation of the key categories of informationsecurity in this field, also it is necessary to make legislative definition of a specialized entity, which will be entrusted with the task ofensuring information security in the customs. Besides, it is necessary: to strengthen the interaction of customs authorities with otherentities of ensuring information security in Ukraine, to guarantee the participation of the public and non-state actors in ensuring informationsecurity in the customs sphere, and further automation and development of information and telecommunication systems of customsauthorities, improving the technological and technical level of these systems and other activities.


Sign in / Sign up

Export Citation Format

Share Document