scholarly journals MODELING OF INFORMATION SECURITY SYSTEM IN COMPUTER NETWORK

Author(s):  
Bogdan Korniyenko ◽  
Liliya Galata

This article presents simulation modeling process as the way to study the behavior of the Information Security system. Graphical Network Simulator is used for modeling such system and Kali Linux is used for penetration testing and security audit. To implement the project GNS3 package is selected. GNS3 is a graphical network emulator that allows you to simulate a virtual network of more than 20 different manufacturers on a local computer, connect a virtual network to a real one, add a full computer to the network, Third-party Applications for network packet analysis are supported. Depending on the hardware platform on which GNS3 will be used, it is possible to build complex projects consisting of routers Cisco, Cisco ASA, Juniper, as well as servers running network operating systems. Using modeling in the design of computing systems, you can: estimate the bandwidth of the network and its components; identify vulnerability in the structure of computing system; compare different organizations of a computing system; make a perspective development forecast for computer system; predict future requirements for network bandwidth; estimate the performance and the required number of servers in the network; compare various options for computing system upgrading; estimate the impact of software upgrades, workstations or servers power, network protocols changes on the computing system. Research computing system parameters with different characteristics of the individual components allows us to select the network and computing equipment, taking into account its performance, quality of service, reliability and cost. As the cost of a single port in active network equipment can vary depends on the manufacturer's equipment, technology used, reliability, manageability. The modeling can minimize the cost of equipment for the computing system. The modeling becomes effective when the number of workstations is 50-100, and when it more than 300, the total savings could reach 30-40% of project cost

2018 ◽  
Vol 7 (2.7) ◽  
pp. 807
Author(s):  
M Trinath Basu ◽  
Dr JKR Sastry

Many developers have designed their own architecture for installing the cloud computing infrastructure. The existing cloud computing architectures differs in many ways. Security has been the serious issue as client related data and processing is undertaken using the infrastructure provided by third party service providers varies greatly. It is necessary to know the extent of inclusion of security into the cloud computing system and then find the best architecture that includes best and tight security system. In this paper, a comparison of existing architectures from the perspective of inclusion of security infrastructure within cloud computing system is presented along with a comprehensive architecture that is included with every aspect of security taking into account the most of the vulnerabilities.  


2018 ◽  
Vol 210 ◽  
pp. 04005
Author(s):  
Maciej Kiedrowicz ◽  
Jerzy Stanik

The article outlines the concept of maintaining the required security level of the information system in the organization (SIO) through appropriate control of the security configurations of the security system. The security system (SS) model was proposed and its basic elements characterized to maintain the current security level of the information resources. The desired current security feature of the SIO shall be obtained by generating appropriate security technical and organizational configurations from the set of permissible solutions. The proposed concept, which takes into account the impact of not only basic security elements of the information resources (e.g. types of resources, security attributes, risks, vulnerability), but also changes in the working conditions of the information system and security system as well as the entire security and quality management environment of the organization, constitutes own proposal of the authors.


Author(s):  
Volodymyr Panchenko ◽  

The article presents the author's method of estimating the complex indicator of ID-profiles of the company's personnel, developed on the basis of the economic approach. It is proved that the concept of "personnel security" is a process of identifying and neutralizing the impact on the economic security of the enterprise of various risks and threats associated with the actions and / or inaction of staff. It is established that the "personnel security system" is a set of interrelated relations between staff and owners (managers) to neutralize threats to the economic security of the enterprise. The concept of "personnel security management" is proposed, which should be understood as management actions of owners (management) to identify and neutralize the impact on the economic security of the enterprise of various risks and threats associated with the actions and / or inaction of staff. The own scheme of a technique of estimation of a complex indicator of ID-profiles of personnel of the enterprise which consists of four stages is offered that allowed to give offers on improvement of stages of an estimation of interdependence of the personnel enterprise which is built on set of departments of the enterprise. Developed adequate methods for assessing and modeling indicators of the personnel security system of the enterprise, in terms of structure and dynamics of personnel, wages and productivity, social indicators, level of education and qualifications, job organization and labor process and indicators related to the personnel component information security.


2020 ◽  
Vol 10 (2) ◽  
pp. 45-52
Author(s):  
Federico Beltrame ◽  
Luca Grassetti ◽  
Maurizio Polato ◽  
Giulio Velliscig

This paper delves into the implications for the bank behaviour about firm loan pricing conditions of the new direction undertaken by supervisory and regulatory authorities in the aftermath of the deterioration of the loan portfolio quality that hit EU banks. The 2014 AQR exercise embraces the new direction and extensively uses debt service coverage measures to assess a firm’s loan quality. We, therefore, check whether the DSCR has influenced debt pricing conditions by analysing a panel of 655 listed EU firms from 2009 to 2017. Our findings show that Z-score is unable to discriminate between high and low credit risk firms. The DSCR becomes significant only after 2014, highlighting the incremented importance of this ratio in the bank’s loan pricing determination. Our work contributes to the literature investigating third-party interdependencies with the interplay between lender-borrower relationship and loan pricing and further extends the literature on creditworthiness metrics beyond their mere default-prediction ability (Beaver, 1966; Houghton & Woodliff, 1987). Our results highlight the relevance of the DSCR in the bank’s loan pricing determination and inform firm managers about the drivers that influence the cost of debt thereby enhancing their operational and financial planning.


2018 ◽  
Vol 2018 ◽  
pp. 1-11
Author(s):  
Peter G. Furth ◽  
Ahmed T. M. Halawani

As transit agencies and road owners adopt the objective of protecting transit from congestion, it becomes important to have a method for measuring the cost that congestion imposes on transit. Congestion impacts transit both by lowering average speed and by increasing service unreliability. Altogether, five congestion impacts were identified: increased running time and recovery time for transit operators and increased riding time, waiting time, and buffer time for passengers. A methodology for estimating those impacts was developed using automatic vehicle location data. The basic approach was to compare the impact variables during various periods of the week against a base period when there is no congestion (late night and early morning), making adjustments to account for differences in demand that affect running time apart from congestion. The methodology was successfully applied to a sample of 10 bus routes in the Boston area. The cost of congestion on the sample routes was found to range from $1 to $2 per passenger, with annual costs as great as $8 M per year on some routes. Of the total congestion cost, just under 20% applies to the operator, with the remainder applying to passengers. And while the operator is mainly affected by increased average delay, passengers are mainly affected by worsening service reliability.


2019 ◽  
Vol 10 (4) ◽  
pp. 38-59
Author(s):  
Sarala Ramkumar ◽  
Zayaraz Godandapani ◽  
Vijayalakshmi Vivekanandan

In the modern world, globalization has made way for easy access to information systems for running businesses effectively. The misuse of information systems may lead to loss of productivity, revenue, and sometimes to legal liabilities. Therefore, information security is a major concern for running the business successfully. It is the responsibility of the information security personnel of an organization to develop strategies, and identify the suitable controls to mitigate the risks to which the organization is exposed to. Selection of a suitable set of security controls depends upon, the risks to be addressed, the impact of the risks in terms of revenue, and the cost incurred in implementing the selected controls. To assist in the selection of optimal security controls a hybrid intelligent approach combining the tabu search technique and genetic algorithm has been proposed. The obtained results prove that the proposed approach provides better results in the selection of optimal counter measures.


Author(s):  
Iurii I. Sineshchuk ◽  
◽  
Tatiana I. Davydova ◽  

Finding the optimal structure of an information security system is an important task complicated by its uncertain, stochastic and nonlinear nature especially, if resources are constrained. The article considers a mathematical model for determining the cost of damage prevented by information security tools, and the cost of their installation and maintenance. The optimization criterion is the minimum cost of the damage prevented. Task variables are the number of different types of security features installed in the security system. The authors propose a methodology to substantiate rational composition of information security tools, taking into account economic constraints.


2021 ◽  
Vol 6 (2 (114)) ◽  
pp. 19-29
Author(s):  
Yuliia Tatarinova ◽  
Olga Sinelnikova

One of the key processes in software development and information security management is the evaluation of vulnerability risks. Analysis and evaluation of vulnerabilities are considered a resource-intensive process that requires high qualifications and a lot of technical information. The main opportunities and drawbacks of existing systems for evaluation of vulnerability risks in software, which include the lack of consideration of the impact of trends and the degree of popularity of vulnerability on the final evaluation, were analyzed. During the study, the following information was analyzed in the structured form: the vector of the general system of vulnerability evaluation, the threat type, the attack vector, the existence of the original code with patches, exploitation programs, and trends. The obtained result made it possible to determine the main independent characteristics, the existence of a correlation between the parameters, the order, and schemes of the relationships between the basic magnitudes that affect the final value of evaluation of vulnerability impact on a system. A dataset with formalized characteristics, as well as expert evaluation for further construction of a mathematical model, was generated. Analysis of various approaches and methods for machine learning for construction of a target model of dynamic risk evaluation was carried out: neuro-fuzzy logic, regression analysis algorithms, neuro-network modeling. A mathematical model of dynamic evaluation of vulnerability risk in software, based on the dynamics of spreading information about a vulnerability in open sources and a multidimensional model with an accuracy of 88.9 %, was developed. Using the obtained model makes it possible to reduce the analysis time from several hours to several minutes and to make a more effective decision regarding the establishment of the order of patch prioritization, to unify the actions of experts, to reduce the cost of managing information security risks


Sign in / Sign up

Export Citation Format

Share Document