scholarly journals THEORETICAL BASIS FOR DETERMINING THE LEVEL OF GUARANTEES OF AUTOMATED SYSTEMS FROM UNAUTHORIZED ACCESS

2017 ◽  
Vol 34 (2) ◽  
Author(s):  
С. С. Бучик ◽  
О. К. Юдін ◽  
Р. В. Нетребко
2018 ◽  
pp. 48-58
Author(s):  
I P Mikhnev ◽  
Nataliia Anatol'evna Sal'nikova ◽  
Irina Petrovna Medintseva

The monograph presents studies of information protection tools against unauthorized access to automated radionuclide spectrometry systems based on a scintillation gamma spectrometer. As a result of the conducted researches, the system's security indicators have been obtained, which allow to calculate and optimize the probability of damage from unauthorized access taking into account the operating time and the applied information protection means. The developed analytical estimations allow to calculate the upper and lower bounds of the probability of unauthorized access to confidential information at the design stages of automated systems.


2016 ◽  
Vol 9 (1) ◽  
pp. 40-42 ◽  
Author(s):  
Никитин ◽  
A. Nikitin ◽  
Дровникова ◽  
I. Drovnikova ◽  
Рогозин ◽  
...  

Presents algorithms for calculating the quantitative criterion of security of the automated systems (AS) and the effectiveness of the systems of information protection from unauthorized access (GIS LMI) in these systems, implement early times-robotany mathematical model of identification and evaluation of quantitative criteria the AS security based on the requirements of GOST R ISO/IEC 15408-2-2013. Developed by algorithms are an integral part of the system is automatically bundled design (CAD) GIS LMI AC.


2019 ◽  
Vol 18 (6) ◽  
pp. 1301-1332 ◽  
Author(s):  
Oksana Bokova ◽  
Irina Drovnikova ◽  
Andrei Etepnev ◽  
Evgeniy Rogozin ◽  
Victor Khvostov

Modern methods of protecting information  from unauthorized access in automated systems are based on the use of specialized information security systems from unauthorized access. Security systems are necessarily included in the form of additional software systems in the software as in a secure execution. Information security systems from unauthorized access can be developed not only in a process of automated systems design, but also complement the system-wide software of functioning systems. The use of the information security systems from unauthorized access can reduce a overall reliability of the automated systems, if they contain errors that are not detected during debugging. The reliability of the information security systems affects effectiveness of information security (confidentiality, integrity and availability). Guidelines of the Federal Service for Technical and Export Control (FSTEC) of Russia are a methodological basis for the formation of the information security systems’ image both in the process of development and in the process of modernization of the automated systems. The guidance documents of FSTEC of Russia do not contain methodological approaches to assessing the reliability of these program systems. In this regard, the actual design of techniques of estimating reliability of the information security systems from unauthorized access in automated systems in a secure execution. The structural complexity of the information security systems from unauthorized access and large number of functions performed necessitates the use of three reliability indicators that characterize the system in solving problems of confidentiality, integrity and availability of information. To develop the technique, the known methods of evaluating the reliability of complex systems are used, which do not allow their decomposition into serial and parallel connection. The developed methods were tested in assessing the reliability of the information security systems from unauthorized access with typical indicators of initial characteristics. The results of calculations and prospects of using the developed methods are presented in the paper.


2020 ◽  
Vol 2 (1) ◽  
pp. 49-55
Author(s):  
Safwan Al Salaimeh

The risks of automation in making "smart" decisions are among the most critical problems facing the modern world, as the issue of digitizing all areas of society is an integral part of it. Today, anyone tries to make their life simple in everything from robots used in production to remote control of home appliances. The decision-making process also tends to be simplified, but this simplification creates some risks that must be addressed, minimized, or prevented at best. This research aims to understand the principles and methods of developing, making, implementing, automating decisions and risks. In this study, the phenomenon of automating administrative decision-making was studied, the risks of this trend were considered, and the extent of effective implementation of this trend in Jordan was understood. This work can be used as a theoretical basis for automating business processes and as practical recommendations for monitoring and researching vulnerabilities in automated systems.


2019 ◽  
pp. 14-18
Author(s):  
V. V. Erokhin

The article discusses modern approaches to improving the management of microloans in remote customer service. The lack of full-fledged microfinance information systems reduces the efficiency of credit institutions, which, as a result, leads to an increase in interest rates and hampers the development of the microloans market to the public. One of the modern areas of lending to the population, which allows to solve the problems of cash turnover, is the improvement of automated systems for managing micro-loans for remote customer service. The theoretical basis for improving the automation of long-term and short-term microloans is presented. Presented the development and improvement of information subsystems for loans.


Sign in / Sign up

Export Citation Format

Share Document