scholarly journals Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies

2020 ◽  
Vol 27 (2) ◽  
pp. 6-17
Author(s):  
Anna V. Batskih ◽  
Irina G. Drovnikova ◽  
Evgeni A. Rogozin
Author(s):  
A. V. Batskikh ◽  
V. V. Konobeevskikh ◽  
S. V. Efimov

Objective. The purpose of the article is to analyse the existing methodology used to assess the efficiency of automated information security systems by studying open literature sources, international and industry standards of the Russian Federation on information security of automated systems, guidelines and orders of the Federal Service for Technical and Expert Control of Russia, as well as departmental orders, instructions and regulations on information security at informatization facilities of internal affairs bodies. The analysis results in identifying the advantages and disadvantages of the specified methodology, as well as the possibilities of its use when conducting a quantitative assessment of the efficiency of access control subsystems of information security systems at the informatization facilities of internal affairs bodies. Methods. To achieve this goal, the method for system analysis of approaches used to assess the efficiency of information security tools and systems has been applied. Results. The paper presents results of analysing the main approaches used to assess the efficiency of tools and systems for information security of automated systems. The paper determines the relationship between the efficiency indicator of access control subsystems of information security systems and the main disadvantage of their use in protected automated systems of internal affairs bodies. The paper substantiates main directions of improving the existing methodology, proposes methods and indicators for quantifying the efficiency of access control subsystems (including those modified on the basis of using new information and communication technologies) of information security systems in protected automated systems of internal affairs bodies. Conclusion. The results obtained can be used to quantify the security level of existing automated systems and those being developed at informatization facilities of internal affairs bodies.


Author(s):  
Sai Sree Laya Chukkapalli ◽  
Shaik Barakhat Aziz ◽  
Nouran Alotaibi ◽  
Sudip Mittal ◽  
Maanak Gupta ◽  
...  

2017 ◽  
Vol 7 (4) ◽  
pp. 1-24 ◽  
Author(s):  
Arindam Roy ◽  
Shamik Sural ◽  
Arun Kumar Majumdar ◽  
Jaideep Vaidya ◽  
Vijayalakshmi Atluri

Sign in / Sign up

Export Citation Format

Share Document