SYSTEMATIC ANALYSIS OF ACCESS LIMITATION PROCESS UNDER DISCRETIONARY POLICY OF CONTROL

Author(s):  
Yury Vasil'evich Kolotilov ◽  
Shamil Gasanguseinovich Magomedov

The paper describes one of the key problems of access limitation to information resources under the discrete control policy of access - a problem of obtaining the guarantee that there will never take place any violation of the requirements of access limitation policy under the selected strategy of providing information security and strict compliance with its requirements. To solve this problem is possible only using formalized methods. There has been suggested a formalized access limitation model comprising 5 components: multitude of agents having access to data processing software and hardware; multiple facilities of data processing system (information resources and data, software, hardware), which can become the object of activities of at least one agent; multitude of rights of access (a set of types of access); multitude of access limitations for an agent to a facility; multitude of requirements for the agent access; multitude of activities. The paper closely studies the component of multitude of activities, which includes all possible methods, means and techniques to deter threats and attacks, which can be used in the security system in order to provide and change ways of access of an agent to a facility. To arrange all the possible activities there have been singled out the four key criteria in terms of access limitation: the category to which the activity refers; affecting environment; the order of impact; the focus of activities. The individual characteristics of each of the four criteria have been described. Systematization criteria could lay the base of rules covering all possible situations and corresponding mechanisms of action. Creating such a base and its regular renewal and improvement are necessary for developing conditions for mass use of standard clarified protective means of information security.

2021 ◽  
pp. 137-142
Author(s):  
Наталья Анатольевна Буравлева

Изменения, происходящие в обществе, усложнение профессиональных задач делают актуальным запрос к высшими учебными заведениями о подготовке специалистов к инновационной деятельности. Для развития инновационного потенциала студентов современный образовательный процесс в высшем учебном заведении должен иметь личностно-профессиональную направленность. Значимым фактором развития инновационного потенциала студентов является образовательная среда и психолого-педагогическое сопровождение образовательного процесса. Changes in society, the complexity of professional tasks actualize the request to universities to train specialists who are ready for innovation. To develop the innovative potential of students, the modern educational process in universities should be focused not only on the professional training of students, but also on the development of personality. Innovative activities, solving creative tasks to create new products and technologies require active work of the intellect, motivation and will, and this stimulates the development and selfdevelopment of a person. An important factor in the development of innovative potential of students is the educational environment. The functioning of this environment should be based on a systematic analysis of the object, subject, processes, and conditions of innovative development. In addition, it is important to determine the criteria for the effectiveness of the innovation environment, as well as to implement the principle of ensuring the continuous development of students. For the development of innovative potential, it is necessary to use psychological and pedagogical support of the educational process. The main principle of psychological and pedagogical support of the educational process is to take into account the individual characteristics and capabilities of students, the development of their resources. Psychological and pedagogical support of the educational process should be aimed primarily at the actualization of personal competencies that determine innovative activity. For the development of innovative potential, students should participate in the choice of an individual educational trajectory, show educational initiatives and implement them in research activities.


Author(s):  
V. A. Sizov ◽  
A. D. Kirov

The article is devoted to the problem of developing an analytical data processing system for monitoring information security within the information security management system of modern companies conducting their main activities in cyberspace and using cloud infrastructure. Based on the analysis of modern information technologies related to ensuring information security of cloud infrastructure and the most popular products for ensuring information security of cloud infrastructures, as well as existing scientific approaches, a formalized approach to the synthesis of an analytical data processing system for monitoring the information security of an informatization object using cloud infrastructure is proposed. This approach takes into account the usefulness of the used information technologies from the viewpoint of information security. A general model of the structure of information support of an analytical data processing system for monitoring information security, as well as a model of the dependence of the usefulness of information technology on time and the ratio of the skill level of an information security specialist and an attacker are presented. The quality of the information security monitoring system is used as a criterion in the first optimization model. The following limitations are suggested: limitation on the time of making a decision on an incident; limitation on the degree of quality of analysis of information security events by the analytical data processing system and limitation on the compatibility of data analysis functions with data types about information security events. The cited results of the study of the second model show a logically consistent dependence of the usefulness of information technology on time and the ratio of the skill level of an information security specialist to the skill level of an attacker. The particular models of the structure of the information support of ASOD are presented. They make it possible to determine the rational structure information support of ASOD according to particular criteria. The following particular criteria are used: the maximin criterion of the usefulness of the information support of ASOD for monitoring the information security of an informatization object in the cloud infrastructure; the criterion for the maximum relevance of information support distributed over the nodes of the cloud infrastructure for systems with a low degree of centralization of management.


2020 ◽  
Vol 240 (2-3) ◽  
pp. 161-200
Author(s):  
Matthias Dütsch ◽  
Ralf Himmelreicher

AbstractIn this article we examine the correlation between characteristics of individuals, companies, and industries involved in low-wage labour in Germany and the risks workers face of earning hourly wages that are below the minimum-wage or low-wage thresholds. To identify these characteristics, we use the Structure of Earnings Survey (SES) 2014. The SES is a mandatory survey of companies which provides information on wages and working hours from about 1 million jobs and nearly 70,000 companies from all industries. This data allows us to present the first systematic analysis of the interaction of individual-, company-, and industry-level factors on minimum- and low-wage working in Germany. Using a descriptive analysis, we first give an overview of typical low-paying jobs, companies, and industries. Second, we use random intercept-only models to estimate the explanatory power of the individual, company, and industry levels. One main finding is that the influence of individual characteristics on wage levels is often overstated: Less than 25 % of the differences in the employment situation regarding being employed in minimum-wage or low-wage jobs can be attributed to the individual level. Third, we performed logistic and linear regression estimations to assess the risks of having a minimum- or low-wage job and the distance between a worker’s actual earnings and the minimum- or low-wage thresholds. Our findings allow us to conclude that several determinants related to individuals appear to suggest a high low-wage incidence, but in fact lose their explanatory power once controls are added for factors relating to the companies or industries that employ these individuals.


2018 ◽  
Vol 28 (1) ◽  
pp. 25-30
Author(s):  
Vojislav Ilić ◽  
Igor Novaković ◽  
Slobodan Cvetanović

During the last decade of the last century, the concept of capital in scientific literature has been significantly expanded. Namely, for decades, the belief that the category of capital includes only visible resources has been modified in terms of extending its comprehensiveness to intangible resources, such as human and social capital. Human capital encompasses knowledge, skills, competencies and characteristics embodied in the individual, which enable the creation of personal, social and economic well-being, while social capital represents the capital of cooperation, interaction, mutual trust and help. When it comes to education, the ability to acquire the necessary knowledge, skills and competences is crucial for the economic and social progress of individual countries. Unlike physical capital that is completely tangible, human and social capital are intangible. Recent approaches, as components of human capital, in addition to education and the level of health status of the population, outline the characteristics of people and societies that have an impact on the effects of work, including factors of ability, motivation and culture, etc. Some experts extend the content of human capital to individual characteristics of people such as creativity, innovation, motivation, attitudes (about life, business, etc.), diligence, responsibility, perseverance, self-initiative, communication success, problem solving, critical thinking, self-study, flexibility and adaptability. The paper considers the contribution of education as one of the basic and absolutely indisputable component of human capital to the development of social capital. It has come to the conclusion that countries with high education of the population tend to become richer and to invest more and more resources in the development of their own processing system. Therefore, in current business conditions in the process of creating human capital, the importance of activities focused on lifelong education and professional development is especially important. Both types of capital are developing in close interdependence. The increase in human capital corresponds significantly to the development of social capital. On the contrary, social capital represents an essential premise of increasing the efficiency of human capital. Moreover, there is not a small number of authors who regard certain attributes of social capital as human capital components. Considering the contribution of education as a component of human capital to the development of social capital, it can be concluded that education does so because it helps young people to recognize their duties as members of society, promote civil and social engagement of people and influence human behavior. Citizens with higher education have a high degree of civic and social engagement. The educated people are much more involved in their communities and take practical steps to improve the welfare of communities in which they live contributing, among other things, to the development of social capital.


Author(s):  
Simon Zhorzhevich Simavoryan ◽  
Arsen Rafikovich Simonyan ◽  
Georgii Aleksandrovich Popov ◽  
Elena Ivanovna Ulitina

This article is dedicated to construction of the system of information security in automated data processing systems that function by analogy with the human immune system. The subject of this research is the development of the procedure for countering external intrusions of viruses, spam, and other destructive software programs in automated data processing systems. The object of this research is the systems of ensuring information security in automated data processing systems and human immune system. Methodological research on elaboration of the procedure for identification of intrusion is conducted via methods of artificial intelligence, systemic analysis, theory of neural and immune systems in the sphere of ensuring information security based on the achievements of systemic analysis and a systemic-conceptual approach towards information security in automated data processing systems. The main result lies in the developed general procedure for the functionality of the system of ensuring information security in countering external intrusions in the form of block-diagram and its description. The procedure is based on the idea of similarity in functionality of the mechanisms and procedures for protection against external intrusions in both, human immune system and automated data processing system, as well as drawing parallel between them. The main peculiarity of the developed procedure lies in its applicability to the accepted classification of the initial external environment of intrusion onto physical, information, field, and infrastructure environments. Such approach guarantees the novelty of the development from the perspective of constant updating of human immune system countering mechanisms to the external intrusions and its application for each environment in applicable to automated data processing systems.


Author(s):  
Nellya Nagimovna Mustafaeva ◽  
Oksana Mikhailovna Knyazeva

The article presents the method "Inspector" to be adapted for assessment of the levels of quality of data processing systems in universities. Included into the methodology fuzzy cognitive models of determining the required, estimating the current and "forecasted" levels of quality of data processing systems, as well as corresponding algorithms allow evaluating the system at the design stage and operation stage on the basis of expert information. Using the complex criterion of quality assessment makes it possible to increase the informativeness of the assessment, which, in turn, increases the efficiency of quality of data processing systems. Adapting methodology to the peculiarities of functioning of universities includes defining the main functions of the evaluated data processing systems; defining the elements of the sets of concepts of fuzzy cognitive models used in the methodology; verifying the existence of links between concepts of fuzzy cognitive models; filling the knowledge base necessary to assess the current level of information security of the data processing system. The methodology was approved in one of the leading higher educational institutions of the Volga region for assessment of the data processing system "Deccan". To adapt the methodology and directly assess the quality and information security of the data processing system, an expert commission was assembled, consisting of IT staff of the university, professors of profile departments of the university, employees of the dean's office. The work of the commission was organized through meetings. Discussion of each issue lasted until the experts made an agreed decision. According to the data obtained after application of the methodology, there were taken measures to elevate quality of the Deccan system to the level "above average". Approbation of the method "Inspector" showed its applicability for assessing the quality of data processing systems of universities.


1994 ◽  
Vol 12 (6) ◽  
pp. 518-528 ◽  
Author(s):  
M. F. Barth ◽  
R. B. Chadwick ◽  
D. W. van de Kamp

Abstract. The National Oceanic and Atmospheric Administration's (NOAA) Wind Profiler Demonstration Network consists of 32 wind profiling radars, based primarily in the central United States. The network is being used to determine the operational feasibility and characteristics of a possible future nationwide profiler network. Data processing is performed both at the individual profiler sites and at a central hub processing system. This paper documents the algorithms used at the profilers to produce profiles of the moments of the velocity spectrum every 6 minutes, as well as those used on the hub to produce quality-controlled hourly winds.


1974 ◽  
Vol 13 (03) ◽  
pp. 125-140 ◽  
Author(s):  
Ch. Mellner ◽  
H. Selajstder ◽  
J. Wolodakski

The paper gives a report on the Karolinska Hospital Information System in three parts.In part I, the information problems in health care delivery are discussed and the approach to systems design at the Karolinska Hospital is reported, contrasted, with the traditional approach.In part II, the data base and the data processing system, named T1—J 5, are described.In part III, the applications of the data base and the data processing system are illustrated by a broad description of the contents and rise of the patient data base at the Karolinska Hospital.


Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


Author(s):  
M. M. Klunnikova

The work is devoted to the consideration of improving the quality of teaching students the discipline “Numerical methods” through the development of the cognitive component of computational thinking based on blended learning. The article presents a methodology for the formation of computational thinking of mathematics students, based on the visualization of algorithmic design schemes and the activation of the cognitive independence of students. The characteristic of computational thinking is given, the content and structure of computational thinking are shown. It is argued that a student with such a mind is able to manifest himself in his professional field in the best possible way. The results of the application of the technique are described. To determine the level of development of the cognitive component of computational thinking, a diagnostic model has been developed based on measuring the content, operational and motivational components. It is shown that the proposed method of developing computational thinking of students, taking into account the individual characteristics of students’ thinking, meaningfully based on the theoretical and practical aspects of studying the discipline, increases the effectiveness of learning the course “Numerical methods”. The materials of the article are of practical value for teachers of mathematical disciplines who use information and telecommunication technologies in their professional activities.


Sign in / Sign up

Export Citation Format

Share Document