scholarly journals CONSTRUCTION OF SYSTEMS OF PROTECTION FROM UNAUTHORIZED ACCESS FOR INFORMATION SYSTEMS TAMPER LOCATED IN THE INDUSTRIAL USE

2017 ◽  
Vol 21 (6) ◽  
pp. 171-177
Author(s):  
A.N. Krutov

The article discusses the question of construction of the systems of protection against unauthorized access to information systems that are in commercial operation. It offers two concepts of development of the system from unauthorized access with minimal modifications in the already developed information system. As a means of building an effective system of protection in the process means of careful monitoring of access database DBMS Oracle (Fine Grained Access Control) are used. Depending on the size of the source database and the possibility to modify the table structure of the information system it is offered to use one or the other method for constructing a system of protection against unauthorized access. Developed protection system is relatively indepen- dent module that can be implemented in as needed.

THE BULLETIN ◽  
2020 ◽  
Vol 5 (387) ◽  
pp. 16-24
Author(s):  
Nazym Zhumangaliyeva ◽  
◽  
Aliya Doszhanova ◽  
Anna Korchenko ◽  
Svitlana Kazmirchuk ◽  
...  

Nowadays, one of the relevant areas that is developing in the field of information security is associated with the use of Honeypot (virtual lures, online traps), and the selection of criteria for determination of the most effective Honeypot and their further classification is an urgent task. There are presented the main products in which virtual lures technology is implemented. Often they are used to study the behavior, approaches and methods that an unauthorized party uses for unauthorized access to information system resources. Online traps can imitate any resource, but more often they look like real production servers and workstations. There are known a number of fairly effective developments that are used to solve the problems of identifying attacks on the information systems resources, which are based on the fuzzy sets apparatus. They showed the effectiveness of using the appropriate mathematical apparatus, the use of which, for example, to formalize the approach for the formation of a set of criteria, will improve the process of determining the most effective Honeypot. For this purpose, there have been proposed criteria that characterize online traps, with the use of which there has been developed a method of linguistic variable standards formation for choosing the most effective Honeypot. The method is based on the formation of a set of Honeypot, subsets of characteristics and identifier values of linguistic estimates of Honeypot characteristics, a base and derivative frequency matrix, as well as on the construction of fuzzy terms and standard fuzzy numbers with their visualization. This will allow further classification and selection of them osteffective virtual lures.


2013 ◽  
Vol 25 (4) ◽  
pp. 1-26 ◽  
Author(s):  
Semina Halilovic ◽  
Muris Cicic

The Expectation-Confirmation Model of Information Systems Continuance (ECM-IS) explains antecedents that influence IS users’ behavior and affect their decision whether to continue or discontinue information system (IS) using. ECM-IS emphasizes differences between initial acceptance and IS continuance. For companies that deal with the design and software development, IS continuance is retaining of existing customers of product and services. This study extends the ECM-IS by accounting for unobserved heterogeneity. The Finite Mixture Partial Least Squares (FIMIX-PLS) methodology is applied for identification of distinctive customer segments. Segmentation of IS users was made on the basis of cognitive beliefs and affect influencing one’s intention to continue using IS and two different segments of users were derived. The first segment comprises 65.6%, and the other one 34.4% users. The ECM-IS explained 51.9% of IS continuance intention and 20.7% of satisfaction for the first segment, while for the second segment the ECM-IS explained 98.1% of IS continuance intention and 91.3% of satisfaction.


2005 ◽  
Vol 85 (2) ◽  
pp. 127-133
Author(s):  
Dejan Sabic ◽  
Misko Milanovic

The paper describes reality method sand geographical information systems (GIS- technologies) in integration GIS system. Sjenica is a specific area of the our state and therefore must notes of all elements and factors in environmental. GISs differ from the other types of information systems in that they manage huge quantities of data, enquire complex concepts to describe the geometry of objects and specify complex topological relationship between them. The paper describes our proposal for the project GIS for local community of Sjenica based on GIS technologies, with particular reference to the GIS demands and possibilities.


1985 ◽  
Vol 16 (4) ◽  
pp. 10-14
Author(s):  
George M. Watters

The Dictionary of Occupational Titles (DOT), supplements to the DOT, and other standardized vocational information have long been used to assist in job placement, vocational and educational planning, and litigation. Recent reliance on computerized information systems has both increased this use and provided rapid access to information results. However, the speed and clerical accuracy of current technology may mask invalid use of information system components. This article examines coding structures used with standardized occupational information to determine “transferable skills:” Proper transferable skills technology is essential to valid application of vocational information. It is intended that this article will spur information users to question and, where possible, determine the underlying systematic technology used for transferable skills analysis.


Author(s):  
V. V. Sobchuk ◽  
O. V. Barabash ◽  
A. P. Musienko ◽  
O. A. Kapustian

The paper proposes a methodology for building an effective system of self-diagnostics of information systems on the example of Ukrainian enterprises in the metallurgical, energy and chemical industries. The article shows that if the dependence of the probability of issuing information on the time of execution of the element of elementary checks is known, it is enough to carry out checks within a predetermined time, when a given probability value is given. It is investigated that in the information system of the enterprise the self-control organized by means of elementary checks occurs at arbitrary moments of time of functioning of modules on purpose and the relation of probability of delivery of the information which occurs by comparison of deviations from average values. Criteria for the adequacy of diagnostic information in the absence of restrictions on the implementation of basic tests and in the presence of restrictions on the implementation of basic tests.


Author(s):  
Win Ce ◽  
Gisella Febrina Alam

High increment of information system needs for company goes in line with the high demands of increasingly competitive and rivalry of industry. Corporate investment needs automatically increase to meet the demanding needs of this system. New developments in systems and technology can not be ignored by companies because it gives a very high economic boost in the competition. On the other hand, in line with the development of information systems is the development of Open Source applications as a cheaper alternative for enterprise use. With so many alternative of Open Sources requires companies to be more observant of selecting the best applications that meet the company needs and can be quickly implemented. This study presents the best approaches to select the best Open Source applications for companies, such as literature review, implementation and evaluation of e-learning Open Source application. 


Author(s):  
K. T. Sharsheeva ◽  
A.N. Zhumabaeva ◽  
G.M. Usubakunova

At the moment, the exchange of data via insecure communication channels is the most vulnerable to information systems that store a large amount of data, the partial loss or substitution of which can lead to irreversible consequences. For this reason, in order to ensure security, the task is to use such methods and means that allow to verify the authenticity of the user's belonging to this system and, if successful, give access to information. In this paper are reviewed authentication methods that can be used depending on the needs of the systems, their vulnerabilities and recommend solutions to use. Authentication is process of granting a user access to an information system. There are three main types of authentication mechanisms: 1. The user knows some unified information (password entry); 2. The user has a unified information storage (smart card, token); 3. The user himself is an integral part of the authentication (biometric). Each authentication mechanism functions differently and has their strengths and weakness.


2004 ◽  
Vol 3 (1) ◽  
Author(s):  
Bonnie Soeherman

Information systems and information technology have become a fundamental component of successful business and organization. That's the same important thing as studying marketing, human resource management, operation management, accounting, and the other business components. That's why most managers, entrepreneur, and other business professional have to understand of information system, as it is understand the other business components. This article describes the concept of normalization as one of the methods of building database. This method is recognized as the key success of database's function within companies.


Author(s):  
Herman Balsters

Businesses can change their business structure by merging with other companies or, on the other end of the spectrum, by smoothly outsourcing some of their business processes to other more specialized parties. In this paper we will concentrate on conceptual modelling of merging and outsourcing information systems. Merging of a collection of information systems will be defined as the construction of a global information system that contains exactly the functionality of the original collection of systems. Such global information systems are called federated information systems, when we wish to address the situation where the component systems are so-called legacy systems; i.e. systems that are given beforehand and which are to interoperate in an integrated single framework in which the legacy systems are to maintain as much as possible their respective autonomy. Two major problems in constructing federated information systems concern achieving and maintaining consistency and a uniform representation of the data on the global level of the federation. The process of creation of uniform representations of data is known as data extraction, whereas data reconciliation is concerned with resolving data inconsistencies. Outsourcing of an information system, on the other hand, will be defined as the handing over of part of the functionality of the original system to an outside party (the supplier). Such functionality typically involves one or more operations, where each operation satisfies certain input- and output requirements. These requirements will be defined in terms of the ruling service level agreements (SLAs). We will provide a formal means to ensure that the outsourcing relationship between outsourcing party and supplier, determined by a SLA, satisfies specific correctness criteria. Formal specifications as offered in this paper can prove their value in the setup and evaluation of outsourcing contracts. We shall describe a uniform semantic framework for specification of both federated and outsourced information systems based on the UML/OCL data model. In particular, we will show that we can represent so-called exact views in UML/OCL, providing the means to capture the duality relation between federating and outsourcing.


2020 ◽  
Vol 2020 (3) ◽  
pp. 59-68
Author(s):  
A. Metelkov

There is an ongoing debate among users and specialists about the effectiveness of passwords used to authenticate subjects of access to information systems. The relevance of choosing the topic of the article is explained by the use of passwords in almost any information system, and in many systems password protection is used as the only means. At the same time, the password's resistance to opening often determines the security of the entire information system. Domestic and foreign modern approaches to password policy formation are analyzed and generalized. On this basis, proposals have been developed to improve the protection of information using passwords.


Sign in / Sign up

Export Citation Format

Share Document