scholarly journals Use of the Utility Tree Technique in Process of Treats Analysis for Information Security in Information and Communication Systems

2010 ◽  
Vol 14-15 (1) ◽  
Author(s):  
Ireneusz Jóźwiak ◽  
Artur Szleszyński
Author(s):  
Suchinthi Fernando

This chapter discusses the importance of information security education for everyone, ranging from organizations to professionals and students, all the way through to individual users of information and communication systems. It discusses the different subject areas in information security and shows how instead of being intimidated by it, different categories of users can obtain varying depths of information security education based on their cyber-activities and need for knowledge. Information security professionals would require an in-depth knowledge in all aspects of information security, and information technology professionals and students would require an overall education in these areas, while most users of information and communication systems would only require a basic education to help protect their information assets in cyberspace.


2020 ◽  
Vol 72 (4) ◽  
pp. 162-167
Author(s):  
S.A. Аdiljanova ◽  
◽  
G.A. Тulepberdinova ◽  
M.J. Sakypbekova ◽  
N.A. Тekesbayeva ◽  
...  

The article discusses the possibility of modifying the genetic algorithm (GA) to solve the problems of selection, optimization and management of the dynamic configuration of information security means for the security chain of information and communication systems (ICS). The scientific novelty of the work lies in the fact that GA recommends using the total cost of information loss risks, as well as cost indicators for each class of information security systems as a criterion for optimizing the composition of the information security system. The genetic algorithm is considered as a kind of problem associated with multiple choice when optimizing the choice of information content of information security and solving problems of dynamic management of cybersecurity resources. In this concept, the optimization of the placement of the information security system along the security chain is considered as a modification of the combined backpack problem. The proposed approach allows not only to quickly calculate various versions of software and hardware information systems and their combinations for ICS, but also to dynamically manage the proposed algorithm with existing models and algorithms to optimize the composition of ICS cybersecurity chains and cybersecurity resources of various information objects. It is possible that such a combination of models and algorithms will quickly restore ICS protection by configuring profiles in accordance with the classes of new threats and cyber attacks.


2022 ◽  
pp. 50-72
Author(s):  
Suchinthi Fernando

This chapter discusses the importance of information security education for everyone, ranging from organizations to professionals and students, all the way through to individual users of information and communication systems. It discusses the different subject areas in information security and shows how instead of being intimidated by it, different categories of users can obtain varying depths of information security education based on their cyber-activities and need for knowledge. Information security professionals would require an in-depth knowledge in all aspects of information security, and information technology professionals and students would require an overall education in these areas, while most users of information and communication systems would only require a basic education to help protect their information assets in cyberspace.


2019 ◽  
Vol 30 ◽  
pp. 04018
Author(s):  
Maria Maslova

In the modern world there is a constant growth of information and information technologies, a risk-oriented approach to managing information security of information and communication systems of companies seems increasingly promising. But apart from development, there are threats and risks that affect both the image and the financial component of companies. Therefore, one of the main tasks is to assess, analyze and prevent the risks of information security in information communication systems using modern methods in conjunction with the use of intelligent analysis methods.


Radiotekhnika ◽  
2021 ◽  
pp. 25-32
Author(s):  
I.D. Gorbenko ◽  
A.A. Zamula

Methods for information exchange, formation and processing of data used in information and communication systems (ICS), as well as classes of broadband signals used as a physical data carrier, do not provide the necessary (for individual ICS applications) indicators of cyber and information security, noise immunity of reception signals and secrecy of IKS functioning. Most of the existing systems use signals, the construction of which is based on linear laws, which allows an attacker, based on the establishment of the parameters of the signals used in the system, to carry out deliberate interference in the operation of the ICS with minimal energy consumption. The article presents conceptual approaches to the construction of secure ICS, which determine the need to cover the entire spectrum of information transformations in the complex, and based on the synthesis of signal systems with improved ensemble, correlation, structural properties. A method is proposed for synthesizing discrete derivatives of signals based on nonlinear discrete complex cryptographic signals (CS) and orthogonal signals formed on the basis of the rows of the Hadamard matrix (initial signals),. Based on computer modeling and the performed calculations, it is shown that the derivative signals formed on the basis of cryptographic sequences and rows of the Hadamard matrix have improved properties compared to orthogonal and linear classes of signals. Approaches to the construction are stated and a general characteristic of the hardware-software complex for synthesis, analysis, study of properties, generation, processing of a number of studied signal classes is given. It is shown that the use of such signals will improve such indicators of the system functioning as information security, noise immunity of signal reception and secrecy of functioning.


Author(s):  
Albert Malikov ◽  
Vladimir Avramenko ◽  
Igor Saenko

Introduction: Models and methods for diagnosing computer incidents recorded in information and communication systems are the most important components in mathematical support of information security systems. The main requirement for the diagnostics is prompt identification of security violation characteristics. This problem is complicated due to the amount and variability of the initial data on information security violation. Purpose: Development of a model for diagnosing a computer incident, along with a method which would allow you to quickly determine the characteristics of a security violation. Results: Security breach characteristics important for making a decision about responding to an identified computer incident can be determined via deep artificial neural networks. A structural feature of the proposed deep artificial neural network is combining the coding part of the autoencoder and a multilayer perceptron. In addition, the method implements a parallel mode of processing information events which have occurred in the information and communication system before the incident was detected, by using a separate proposed artificial neural network for each secondary characteristic of the security breach. The method of determining the values of these secondary characteristics allows you to greatly improve the diagnostics efficiency, having acceptable values of precision and recall for the security violation characteristics to determine. The dependence has been studied of the completeness and classification accuracy on the number of neurons in the hidden layer. A sufficient number of neurons in the hidden layer for achieving the required training efficiency is experimentally determined. Practical relevance: The developed model and method can be implemented using standard software and hardware (servers) of an information and communication system. Their combined use with the existing models and methods of monitoring and diagnostics can significantly improve the efficiency of an information security system.


Author(s):  
Anca Gabriela Petrescu ◽  
Marius Petrescu ◽  
Ioana Panagore ◽  
Florentina Raluca Bîlcan

During the last period, information and communication systems became an essential component of our society that, at its turn, became more and more dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process which, besides its benefits come to raise specific threats to their users' interests. Due to the high level of interconnectivity, it is essential that all members of the cyber community to be aware of their responsibilities in information security. Rising awareness is the first step towards a more trustful and credible communication information environment that is a pre-requisite of the information society. This chapter demonstrates, on the one hand, how Romanian organizations are able to optimize their information security risk in order to streamline their activities and, on the other hand, how security mechanisms have to be properly designed and commensurate with the specific threats for the specific types of information.


2020 ◽  
Vol 4 (8) ◽  
pp. 85-96
Author(s):  
Yuliia Zhdanovа ◽  
Svitlana Spasiteleva ◽  
Svitlana Shevchenko ◽  
Kateryna Kravchuk

The article deals with the use of hashing algorithms for information security in training students of the specialty "125 Cybersecurity" at the Kiev Boris Grinchenko University. The modern hashing algorithms that are widely used in modern digital technologies, in particular, in the tasks of ensuring information security of modern information and communication systems has been analyzes in the article. The need for a thorough study of hashing as a means of ensuring information security has been identified and substantiated. The paper has present a thorough and detailed analysis of typical security tasks involving hashing algorithms such as implementing structures to efficiently store large data sets; searching and storing data in databases; password protection in the authentication process; formation of electronic digital signature; control of integrity and authenticity of important files; digital blockchain technologies and creation of cryptocurrencies. The special programs offered in the form of applications and online services for calculating hash codes of a file or text have been reviewed and compared. Among the tools used to provide students with practical hashing skills are the use of CryptoAPI, Cryptography Next Generation, and Security.Cryptography .NET Framework cryptographic services. Basic cryptographic functions that implement hashing algorithms have been considered. Prospective directions of hashing research for introduction into the educational process have been defined, namely: fuzzy hashing, quantum hashing. The study concluded that the need for a theoretical and practical study of hashing throughout the training of information security professionals.


Radiotekhnika ◽  
2020 ◽  
pp. 126-132
Author(s):  
I.D. Gorbenko ◽  
A.A. Zamula ◽  
Ho Tri Luc

The paper presents the results of solving the urgent problem of improving the performance indicators of information and communication systems (ICS), in particular, information security, noise immunity, secrecy, the speed of formation and processing of information. The use of the distributed spectrum technology (broadband noise-like signals) is a promising direction for ensuring the security of information resources. The methods used for data formation and processing, as well as the classes of broadband signals used as physical data carriers, do not allow providing the necessary (especially for critical infrastructure facilities) indicators of information security and noise immunity. In this case, as discrete sequences (DS) that expand the spectrum (manipulate the carrier frequency), should be used DS based on nonlinear construction rules and having improved correlation, ensemble and structural properties. Methods for the synthesis and formation of nonlinear discrete complex signals, namely, the so-called cryptographic signals, are proposed. The first method, presented in the article, uses random (pseudo-random) processes. Another method is based on the implementation of the operation of decimation of the original discrete sequence of symbols obtained from the results of the implementation of the first method; it provides the synthesis of an ensemble of signals for a certain signal duration. Analytical expressions are obtained for determining the synthesis time of an ensemble of signals using the proposed methods. It is shown that the speed of the signal generation method based on the decimation operation for a certain signal duration is more than three orders of magnitude higher than the speed of the method based on the random (pseudo-random) processes used. At the same time, based on the carried out computer simulation, it is shown that the signals obtained using the proposed methods have identical correlation, ensemble, and structural properties.


Sign in / Sign up

Export Citation Format

Share Document