THE CONCEPTUAL SCHEME OF INFORMATION SECURITY IN THE OBJECT PROTECTION MODEL

Author(s):  
Alexander Georgievich Popov ◽  
Georgiy Aleksandrovich Popov ◽  
Mikhail Fedorovich Rudenko ◽  
Nickolai Dmitrievich Shishkin

This paper proposes a conceptual scheme of information security (IS) which comprises most existing IS systems. There are shown seven components describing IS process in the object protection model: requirements to IS support; the data protected; threats to the protected data; countermeasures to the threats; information system for the protected data processing; conditions facilitating or impeding IS process; object of protection. The diagram showing interrelations of the listed components has been given. The meanings of the entities "requirements", "Information system", "conditions", "object of protection" have been clarified; mechanisms for influencing IS process of such entities as "information system", "conditions", "object of protection" have been revealed. For the entity "requirements" there have been allocated seven classes of requirements to ensure information security; the main legislative and normative documents that define the content of these requirements for each class of requirements have been given. The approaches to measurability and assessment of the rate of requirements implementation have been described. It is stated that a number of elements in a wealth of elementary requirements are rather high, therefore, instead of the list of elementary requirements there are usually developed several generalized factors (probabilistic factor, time factor, expenses factor). IS systems oriented to these factors help to realize a more flexible IS technique, when cases of IS violation not leading to a substantial damage could be even neglected, and IS system will mainly focus on preventing most dangerous attempts to break IS.

The paper describes the development of the "Complex-analytical information system of scientific degrees" for electronic document exchange and digitization of the attestation process for scientific degrees in the field of attestation of highly qualified scientific and scientific-pedagogical personnel, modules that make up the system, their functions, also information security of the system, requirements for functions performed by the system, client-server architecture of data processing in information system.


1974 ◽  
Vol 13 (03) ◽  
pp. 125-140 ◽  
Author(s):  
Ch. Mellner ◽  
H. Selajstder ◽  
J. Wolodakski

The paper gives a report on the Karolinska Hospital Information System in three parts.In part I, the information problems in health care delivery are discussed and the approach to systems design at the Karolinska Hospital is reported, contrasted, with the traditional approach.In part II, the data base and the data processing system, named T1—J 5, are described.In part III, the applications of the data base and the data processing system are illustrated by a broad description of the contents and rise of the patient data base at the Karolinska Hospital.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2019 ◽  
Vol 3 (1) ◽  
pp. 49-61
Author(s):  
Fitriani Dwi Ratna Sari ◽  
Amin Suryana

Research that the author did aim to know how to design inventory system on Planet Phone.The method used is quantitative descriptive method. Data collection techniques used are literature study, observation, and interviews. From the research conducted found that there is a problem on inventory data processing. The process of inventory data processing only by writing using a general ledger. So this causes inaccuracies and delays in reports. Therefore the authors make the information system by using PHP and MySQL database. This system consists of inputting inventory data, inventory reports, sales reports and income reports. As for some suggestions given to tackle the problem is by connecting the system with internet connection, for employees more quickly and effectively in penginputan inventory data and owner can also know the sales reports and income reports more quickly without having to come directly to the store.


2018 ◽  
Vol 4 (1) ◽  
pp. 87-96
Author(s):  
Yanni Suherman

Research conducted at the Office of Archives and Library of Padang Pariaman Regency aims to find out the data processing system library and data archiving. All data processing is done is still very manual by using the document in writing and there is also a stacking of archives on the service. By utilizing library information systems and archives that will be applied to the Office of Archives and Library of Padang Pariaman Regency can improve the quality of service that has not been optimal. This research was made by using System Development Life Cycle (SDLC) which is better known as waterfall method. The first step taken on this method is to go directly to the field by conducting interviews and discussions. This information system will be able to assist the work of officers in terms of data processing libraries and facilitate in search data archives by presenting reports more accurate, effective and efficient.


1974 ◽  
Vol 2 (1) ◽  
pp. 21-28
Author(s):  
Manfred Weihermüller

After some first impulses had been received from learned writers, preparatory work for the use of electronic data processing (EDP) in overcoming the difficulties in obtaining information in the legal system was taken up in the Federal Ministry of Justice as early as in 1967.


2021 ◽  
Vol 1 (1) ◽  
pp. 49-60
Author(s):  
Dea Okta Viani ◽  
Choiriyah Choiriyah

A financial information system is an information system designed to provide information about money options for users throughout the company. The financial information system is part of the MIS which is used to solve corporate financial problems. In general, the financial information system has an income system consisting of a data processing subsystem supported by an internal audit subsystem that provides internal data and information. For large companies it usually has staff internal auditors. Like other subsystems, this system is also equipped with the financial intelligence subsystem, which collects information from the environment.


Sign in / Sign up

Export Citation Format

Share Document