SYSTEMATIC APPROACH TO THE COMPOSITION OF CONTROL FUNCTIONS IN THE INFORMATION SECURITY SYSTEMS

Author(s):  
Georgiy Aleksandrovich Popov ◽  
Ekaterina Aleksandrovna Popova

The paper highlights the procedure of forming the composition of management functions in the information security systems, which is based on a systematic approach. The stages of the life cycle of the threat and the realization pattern of the function have been chosen as indicators of the classification of information security functions - a priori (before the threat was manifested, i.e. responses to threats are taken on a scheduled basis), or a posteriori (after the threat had been realized, i.e. responses to threats are taken in real time). Two classes of functions are distinguished: functions ensuring the information security and functions controlling mechanisms for ensuring the information security. The research of all the dedicated functions resulted in forming a set of 22 functions. For the information security functions there were built two diagrams of possible outcomes, such as successful protection of information, breaking the security system, or its damage in the course of the function realization. The procedure of finding probabilities for the outcomes using the diagrams has been described. The efficient realization of the functions offered is more dependent on the way the functions are used and organized in the framework of an integral technology of providing information security and on the amount of the resource and financial support of these functions. Building the diagram of the outcomes helps to formalize and solve the tasks of distribution of the resources needed for increasing the level of information security. As an example there have been presented two statements of the distribution problem for improving the efficiency of realization of each of the above functions.

Author(s):  
Estera Pietras

Due to the exchange of information, organizations are encouraged to create an effective system of information flow that should be monitored on a regular basis in order to minimize the risk of emergence of threats. Due to modern technical solutions of security systems, it is much more possible and accessible than a few years ago. For this purpose, proper identification and classification of threats is necessary. This constitutes the starting point for considering the role and the essence of risk. The article highlights the aspects related to ensuring information security as a whole and data protection- the most important assets of business entities.


Author(s):  
Igor Agostini

In this chapter I argue the following thesis: 1) Descartes’s Meditations never formulate the problem of God’s existence as it is required by the precepts of order; in particular, the only problem of existence posed by Descartes after the classification of thoughts in the Third Meditation does not concern God directly, but generally aliqua res. 2) Though Descartes qualifies the two proofs of the Third Meditation as a posteriori, they cannot be considered as homologous in their structure to the traditional a posteriori proofs: they both—and the second in particular—contain components that are truly a priori. 3) The proof of the Fifth Meditation, as it starts from the true definition of God and God’s essence, does not constitute a quoadnos version of the a priori demonstration belonging to mathematics, but is, in a strict sense, a potissima demonstration that is at least as evident as those of mathematics.


Author(s):  
Philippe Véron ◽  
Jean-Claude Léon

Abstract Geometric adaptions and idealizations of 3D models for F.E. analysis purposes are often necessary. Geometric tools are proposed to partly automatize shape adaptions and idealizations of polyhedral models. The simplification process is monitored using error zones attached to each polyhedron vertex. Their dimension may be either set by the designer, by an a posteriori or by an a priori mechanical mesh adaption process. Such an approach allows to process various polyhedral models characterized by general and complex shapes. A classification of nodes and edges is carried out to apply a specific node removal operator in accordance with the local geometric configuration around a node. Moreover, specific criteria are used to select the best candidate node for removal. Also, additional operators have been developed to process particular configurations and produce the final idealized model. During this geometric idealization process, the shape restitution of the part is maintained through an inheritance process of the error zones. Topological changes as well as the coherence of the non-manifold geometric model are managed using specific criteria to produce acceptable approximations of idealized geometries.


2021 ◽  
Vol 6 ◽  
pp. 321-327
Author(s):  
Sergei V. Shurugin ◽  
Arif U. Matveev ◽  
Evgeny V. Gritskevich

The proposed work is devoted to the classification of biometric systems for recognizing subjects, which play an important role in modern information security systems, since they are currently one of the main means of identification and authentication of an individual. The classification schemes presented in this paper allow us to apply a systematic approach to the development of new methods of biometrics.


2021 ◽  
pp. 36-45
Author(s):  
Igor Kotenko ◽  
◽  
Maxim Kolomeec ◽  
Kseniia Zhernova ◽  
Andrey Chechulin ◽  
...  

The purpose of the article: to identify and systematize information security problems that are solved using visual analytics methods, applied data visualization models and methods for assessing the effectiveness of visualization models. Research method: a systematic analysis of the application of visual analytics methods for solving information security problems. Analysis of relevant work in the field of information security and data visualization, as well as methods for assessing visualization. The objects of research are: solving information security problems through visual analysis and methods for assessing the effectiveness of visualization models. The result obtained: an interactive map of visualization models and their areas of application is presented, which will allow researchers and developers to choose the visualization models that are most appropriate for specific applied information security problems. A classification of methods for assessing visualization is presented. The scope of the proposed approach is the creation of visualization models that can be used to increase the efficiency of operator interaction with information security applications. The proposed article will be useful both for students studying in the direction of training “Information Security”, and for specialists who develop information security systems.


Bothalia ◽  
1979 ◽  
Vol 12 (4) ◽  
pp. 723-729 ◽  
Author(s):  
P. Linder ◽  
B. M. Campbell

The need for a classification of the vegetation of the fynbos region is stressed. In the present work we have evaluated some structural-functional approaches that could be used to classify and describe fynbos.  A priori and  a posteriori approaches to classification are reviewed. The a posteriori approach appears to be superior.Test data derived from 21 plots from a range of fynbos types were used to test some methods of collecting and analysing structural-functional information for an  a posteriori  classification. With respect to data collection, no single method was superior. However, a major improvement on our methodology would be possible if the growth-form system used were to be extended. The classifications that were erected were produced by means of computer-based numerical methods. These methods are essential if large data sets are to be analysed. However, the structural-functional classifications produced by numerical methods should only be regarded as working hypotheses; refinement of the classifications should proceed by intuitive methods. We feel that the a posteriori approach, even though it has its problems, will provide a suitable methodology for an ecologically meaningful classification of fynbos vegetation.


2019 ◽  
Vol 191 (1) ◽  
pp. 26-35
Author(s):  
Estera Pietras

Due to the exchange of information, organizations are encouraged to create an effective system of information flow that should be monitored on a regular basis in order to minimize the risk of emergence of threats. Due to modern technical solutions of security systems, it is much more possible and accessible than a few years ago. For this purpose, proper identification and classification of threats is necessary. This constitutes the starting point for considering the role and the essence of risk. The article highlights the aspects related to ensuring information security as a whole and data protection – the most important assets of business entities.


2021 ◽  
pp. 2-15
Author(s):  
Igor Kotenko ◽  
◽  
Maxim Kolomeec ◽  
Kseniia Zhernova ◽  
Andrey Chechulin ◽  
...  

The purpose of the article: to identify and systematize the areas and problems of information security that are solved using visual analytics methods, as well as analysis of the applied data visualization models and their properties that affect the perception of data by the operator. Research method: a systematic analysis of the application of visual analytics methods for solving information security problems. Analysis of relevant papers in the field of information security and data visualization. The objects of research are: theoretical and practical solutions to information security problems through visual analysis. Visual analytics in the article is considered from several sides: from the point of view of the areas of application of visual analysis methods in information security, from the point of view of the tasks solved by the security analyst, from the point of view of the visualization models used and the data structures used, as well as from the point of view of the properties of data visualization models. The result: classification of visualization models is proposed, which differs from analogs in that it is based on the analysis of areas and tasks of information security and comparison of visualization models to them. The scope of the proposed approach is the creation of visualization models that can be used to increase the efficiency of operator interaction with information security applications. The proposed article will be useful both for specialists who develop information security systems and for students studying in the direction of training “Information Security”.


Historians insist that names of places (urbanonyms) are historical sources. There were no description of the methodology and the methods of historical researching of urbanonyms. Though, some interesting publications with a lot of data on the theme in Ukraine have appeared during the last years. The scholar from Odesa (Ihor Hulianovych) published the paper about middle 19th century urbanonyms of the South Bessarabia’s towns (Ackerman, Ismail and Cilia). The author tried to use the linguistic classification of toponyms (by Natalia Podolskaya), but he described places names without this technique and ignoring facts of the historical topography. The conclusions to the article are some disappointing – the start and the finish are similar: the author concluded that the data show the same criteria he had a priori laid down to investigate places` names in three towns. Two papers (the article by Maria Takhtaulova and Liudmyla Savchenko and Maria Takhtaulova`s thesis) from Kharkiv are dedicated to main problems of the characteristics of a complex historical study of the cities` toponymy on the example of Kharkiv. The authors have done careful and deep analysis of the genesis and development of names in the territory of modern Kharkiv, but there is some lack of a systematic approach in these publications. There is no description how to use urbanonyms (places` names of town or city) as a historical source in these article and thesis. A review of these articles shows that scholars have to agree to consider such points: The research of the historical urbanonymy is impossible without the knowledge of historical topography 2. The doubled structure of each urbanonym (a proper noun + denotatum), allowed us to receipt a town`s proper names by their denotatums (topographic terms), more precisely by using items instead of proper noun classification. In sum, it causes the proposal to classify items and draw their hierarchical graph, which should show all manner of a town`s items (natural, manmade and demarcated) and connections of their levels. As well, common terminology needs to be developed.


2017 ◽  
Vol 5 (1) ◽  
pp. 8-15
Author(s):  
Sergii Hilgurt ◽  

The multi-pattern matching is a fundamental technique found in applications like a network intrusion detection system, anti-virus, anti-worms and other signature- based information security tools. Due to rising traffic rates, increasing number and sophistication of attacks and the collapse of Moore’s law, traditional software solutions can no longer keep up. Therefore, hardware approaches are frequently being used by developers to accelerate pattern matching. Reconfigurable FPGA-based devices, providing the flexibility of software and the near-ASIC performance, have become increasingly popular for this purpose. Hence, increasing the efficiency of reconfigurable information security tools is a scientific issue now. Many different approaches to constructing hardware matching circuits on FPGAs are known. The most widely used of them are based on discrete comparators, hash-functions and finite automata. Each approach possesses its own pros and cons. None of them still became the leading one. In this paper, a method to combine several different approaches to enforce their advantages has been developed. An analytical technique to quickly advance estimate the resource costs of each matching scheme without need to compile FPGA project has been proposed. It allows to apply optimization procedures to near-optimally split the set of pattern between different approaches in acceptable time.


Sign in / Sign up

Export Citation Format

Share Document