scholarly journals Preventing information security incidents

2021 ◽  
Vol 6 (3) ◽  
pp. 20-25
Author(s):  
Anastasia A. Voronina ◽  
◽  
Irina I. Skripina ◽  

Information is becoming a very important resource and begins to exceed even tangible assets in importance. In connection with the rapid development of the importance of information in the modern world, encroachments on information resources began to grow. A group of information security tools was developed to prevent unauthorized access to it or its elements. This group of tools is defined as the term "information security". It should be noted that it is precisely the preventive measures to ensure the security of information that are important, and not the elimination of the consequences of these problems. In the course of his work, the developer may accidentally make a mistake as a consequence of which a future vulnerability may be formed at this point. Vulnerability is a weak point of a program or software; having discovered this point, an attacker can easily harm information. If the threat came out deliberate, then there are methods to ensure the security of information. This article discusses information protection measures.

Author(s):  
К. В. К. В. Захаренко

In our state there are a number of complex problems in the field of information security that require urgent and radical solution. That’s why theoretical, methodological and political research of the problem of information security in Ukraine, which is experiencing a crisis phase of its development, is becoming especially relevant today. In order to develop an effective system of national information security, a detailed study of the experience of the leading countries of the world, which carry out effective information protection of their states and citizens, is necessary. Today there are national information security systems that have really proven their effectiveness and structural and functional perfection. Indeed, the successful development of a democratic state and civil society is possible only if the information resources are properly used and the state policy is implemented, which would ensure a high level of national information security. In the modern world, the basic principles and tools for the formation of effective information protection of the national security space have been developed already. At the same time, Ukraine needs to apply adequately the foreign experience of the most successful countries in this regard, correctly transforming it taking into account national specificity and the unique role of Ukraine in modern geopolitics. As an important indicator of the protection of citizens, society and state, information security is an integral part of national security. Therefore, its determination mainly focuses on preventing harmful effects that may result in various information threats, as well as eliminating and overcoming those effects with the least possible harm to society and humans. In this aspect, the study of not only the philosophical and phenomenological and socio-psychological determinants of information security of citizens, but also political and legal resources and mechanisms of protection of the information space of the state in the conditions of the functioning of the global information society acquires a special significance. А content analysis of the notion «information security» as a form of national security aimed at ensuring human rights and freedoms in relation to free information access, creation and implementation of secure information technologies and protection of the property rights of all participants of information activities, includes consideration of possible diversions in this area, especially at the international level. Today there is a situation of incompleteness of formation and fragmentary filling of the information space content of the country and the legislative base in our society. The efficiency of the information weapon itself has increased too quickly due to the rapid information circulation and the spread of information networks. As a result, mass media forms the «mass» person of our time, in turn this fact displaces traditional direct contacts, by dissociating people and replacing them by computers and television. At the same time it gives rise to apathy, uncritical attitude and indifference, it complicates the adequate orientation, causing the social disorientation. Informative safety has the human measuring. Therefore an important role in opposition to destructive external and internal informative influences is played by education of citizens. Her proper level called to provide the state and civil society. An in fact uneducated population easily is under destructive influence of informative threats of the modern global world. Unfortunately, Ukraine, does not have sufficient resources and technologies for adequate opposition to the external threats. Taking into account it strategy of forming of the national system of informative safety of our state can be only the maximal leveling of destructive influences from the side of external informative threats. To the end it is necessary to carry out democratic reforms Ukraine, generate civil society, to provide functioning of the legal state and increase of political and civil culture of population. At the same time it is necessary to bear reformers in a mind, that global nature of informative society predetermines rapid transformation of external threats in internal, converting them into permanent calls which are opened out within the limits of national in a civilized manner-informative and socio-political space. Besides modern global informative systems, mass medias, network facilities do a limit between external and internal threats almost unnoticeable.


2014 ◽  
Vol 484-485 ◽  
pp. 493-496 ◽  
Author(s):  
Xin Ju Mo

with the rapid development and wide application of networking technology, information security increasingly prominent problems are evident, more and more attention. The article introduced the current situation of network information security, explored the meaning of network information security, major threat analysis network information security, and finally gives the implementation technology of network information security and preventive measures, to ensure the information security of computer networks, so as to give full play to role of computer networks.


2019 ◽  
pp. 33-37
Author(s):  
Egor Zhuykov ◽  
Elena Maksimova

Today’s trend is the growth of information security incidents. Confirmation of this is the data of the company InfoWatch, according to which the number of leaks of confidential information in the first half of 2017 has increased by 10% as compared to the same period of 2016, and equals to 925 cases. However, 53% out of these 925 cases of diversion were sold by company employees, and 1.7% – by potential insiders. In the modern world, an insider is a very common concept. It is applicable in different spheres of economic activity. In a general sense, an insider is a natural or legal person who, due to his or her position, has access to valuable (mainly, of course, from an economic point of view) information. Valuable information is also called insider information. The article is devoted to the consideration of video capture systems that can help prevent leakage of information from personal computers in the enterprise. The proposed scheme of expert evaluation of video capture allows you to determine the system based on the selected criteria and specified weight coefficients, and lets the user make the best choice in the decision-making process of a specific problem.


2018 ◽  
pp. 39-43
Author(s):  
Aleksandr Rodionov ◽  
Vladislav Belyanin ◽  
Aleksandr Gorbunov

The research relevance is conditioned by the constantly growing technical capabilities for unauthorized access to protected information in the local area networks (LAN), the development of methods of attacks, and therefore, the need to improve methods of information protection. The paper describes the peculiarities of using the system of collecting and correlating information security events SIEM (Security Information and Event Management), which detects and notifies about the emergence of threats to leakage of protected information. In the modern world, due to the ever-growing technical capabilities of attackers for unauthorized access to LAN, improving the ways of carrying out attacks on them, there is a need to improve the existing methods of information protection and to develop new ones. In addition to the technical component, an important risk factor is the human factor, due to which up to 52 % of information leaks (intentional and unintended) occur around the world. They are distributed by categories of information: 62.3 % – personal data, 31.0 % – payment documents, 3.9 % – state secrets, 2.8 % – trade secrets.


2018 ◽  
pp. 23-29
Author(s):  
Taimuraz Zangiev ◽  
Elizar Tarasov ◽  
Vladimir Sotnikov ◽  
Zalina Tugusheva ◽  
Fatima Gunay

Much attention in the sphere of information technology is paid to the aspects of information security, due to the growing damage. As a result of damage increase, there is a quantitative and qualitative growth in the market of software and hardware for information security. At the same time, new alternatives to existing information security tools are being developed, as well as means of protection against new vectors of attacks associated, for example, with the spread of the concept of ‘Internet of things’, big data and cloud technologies. At the same time, the analysis of information security incidents at enterprises that actively use information security tools shows that the use of information security systems does not provide the required level of protection for information objects that remain susceptible to attacks. According to recent studies, the share of corporate systems in the Russian Federation containing critical vulnerabilities associated with incorrect configuration of information security systems makes up more than 80 %. At the same time, the costs of Russian companies to ensure information security are increasing by an average of 30 % per year. The article presents current problems related to the conflicting requirements to the design of complex information security systems (CISS). The authors suggest an approach to selection and configuration of the CISS facilities based on the role model of M. Belbin in the interpretation of the CISS as a command that will allow building an integrated information protection circuit. The cases of manifestation of synergism and emergence, which ensure the effective functioning of the system, have been described.


2021 ◽  
Vol 291 ◽  
pp. 03018
Author(s):  
Anton Nazarov ◽  
Dmitry Nazarov ◽  
Denis Kovtun

As a result of the spread of malicious information and spam in the Network, unauthorized access, disclosure, distortion, modification, destruction of both personal data of an individual user and digital data that make up the infrastructure of an entire state are possible. Therefore, ensuring information security is today one of the most important tasks of a society that seeks to preserve the current state of its territory of residence in the conditions of various external influences. Within the framework of information protection, a set of measures is implemented to ensure the security of data while maintaining their availability, confidentiality and integrity. The article deals with the problems of ensuring information security in the context of the transition to the digital economy. The article describes the main challenges and threats to databases in the form of unauthorized use, distortion, modification, and destruction of information. The directions and tools for preserving and protecting information posted on digital resources are defined.


Author(s):  
Kira Aleksandrovna Vrublevskaya ◽  
Albert Iscandarovich Azhmukhamedov ◽  
Nadezhda Valerievna Daviduk

The article considers the problem of the effectiveness of information protection system from the human factor and, in particular, of the influence of management measures on the social subsystem on the overall level of information security. It has been stated that risk of classified information leakage occurs due to primary uncertainty of staff behavior and lack of the staff loyalty to the methods of management. It is claimed that the nature of dependency between the regulation of activities and the effectiveness of the work of personnel and compliance with information protection measures testify that the strengthening institutional measures beyond a certain "mark" leads to a decrease in performance and a decrease of information security. The problem solving is in searching and applying methods and mechanisms aimed at changing the state of a social subsystem in the needed direction for a decision taking person. There has been suggested the method that allows selecting optimal level of institutional measures of impact on personnel, exceeding which adversely affects to the effectiveness of the information protection system. It is based on a method of nonstrict ranging for certain activities that need reglamentation, and calculating average level of the staff loyalty to the introduced measures. The experimental study results and the computational example are given


2021 ◽  
pp. 25-29
Author(s):  
S.M. Kovalenko ◽  
◽  
A.S. A.S.Sukhoverkhov ◽  

A methodological approach to the implementation of information protection measures against threats of unauthorized access to the technological process parameters values and their changes, implemented through a distributed control system and leading to an emergency at the oil refining facility, is proposed. An example of approbation of the methodological approach in the context of the distributed control system of the technological process of vacuum distillation is given. The results of assessing the possibility of implementing threats to the system with and without applied protection measures are presented.


Author(s):  
A. I. Tatarinov

With the help of the general and structurally-information schemes of remote control, an analysis was made in the course of which the requirements for protection against unauthorized access of the complex system were clarified and established. In the article structural features of the remote control system of mobile measuring points of rocket and space equipment are considered. These features are represented by the requirements for information protection, as well as the operating modes of this system. The list of these regimes was obtained as a result of studies of structural and functional schemes of a remote control system for mobile measuring points.


Heliyon ◽  
2021 ◽  
Vol 7 (3) ◽  
pp. e06522
Author(s):  
Kwesi Hughes-Lartey ◽  
Meng Li ◽  
Francis E. Botchey ◽  
Zhen Qin

Sign in / Sign up

Export Citation Format

Share Document