scholarly journals Network attacks main danger indicators formation in Internal Affairs Bodies automated systems

2020 ◽  
Vol 27 (3) ◽  
pp. 6-17
Author(s):  
Irina G. Drovnikova ◽  
Elena S. Ovchinnikova2 ◽  
Evgeni A. Rogozin
Author(s):  
I. G. Drovnikova ◽  
Е. S. Ovchinnikova ◽  
V. V. Konobeevsky

Abstract. Aim Important contemporary trends in the theory and functional practice of secure automated systems at informatisation facilities of internal affairs bodies include an increase in the number of threats realised through remote unauthorised access (network attacks) on confidential in-formation resources, as well as the increasing complexity of implementing mechanisms aimed at providing protection from such attacks. In order to increase the effectiveness of existing and prospective automated security systems at the informatisation facilities of internal affairs bodies, it is necessary to identify and analyse typical network attacks aimed at components and software comprising these systems.Method. The method for solving this problem consists in a comprehensive analysis of the process of implementing network attacks on automated systems when they are used in secure mode in the informatisation facilities of internal affairs bodies.Results. Based on the analysis of information held in the security threat database developed by the Russian Federal Service for Technical and Export Control (FSTEC), modern features and operations of secure automated systems on the informatisation facilities of bodies of internal affairs and the results of a survey of experts in the field of information protection of allocated in accordance with the classification typology, eight types of dan-gerous attacks on automated systems of the internal affairs bodies are described taking into account their sources, objects, effects and possible consequences of implementation.Conclusion. The presented results are of use in further studies to conduct a quantitative assessment of the danger of typical attacks and for developing a private model of actual attacks for a specific automated system, taking into account their functional features in secure mode operations at the informatisation facility of the internal affairs body.


2020 ◽  
pp. 108-120
Author(s):  
О. Zherebko

The article analyzes forensic activity as one of the forms of activity in the field of legal proceedings. A comprehensive analysis of forensic activity has allowed formulating a number of proposals regarding ways and means of improving it. Ways of improving forensic activities have been identified and proposed: increasing the level of technical and forensic support for the disclosure, investigation and prevention of crimes; implementation of measures to increase the effectiveness of the participation of specialists of expert services in conducting investigative actions and operational-search measures. There is also indicated on improving research activities and introducing into practice new technical and forensic tools, forensic methods and techniques. Conducting forensic records, analytical and organizational work based on the introduction of modern automated systems and technologies; synthesis and dissemination of best practices and analysis of expert practice; improving the selection, training and placement of employees of expert units, strengthening official and executive discipline. Intensification of interaction between the expert services of the Ministry of Internal Affairs with other departments of the internal affairs bodies, as well as with other law enforcement agencies, including at the interstate level is described.


Author(s):  
Yu. M. Barkalov ◽  
I. G. Drovnikova ◽  
A. M. Kadnova ◽  
E. S. Ovchinnikova ◽  
E. A. Rogozin

Author(s):  
A. V. Batskikh ◽  
V. V. Konobeevskikh ◽  
S. V. Efimov

Objective. The purpose of the article is to analyse the existing methodology used to assess the efficiency of automated information security systems by studying open literature sources, international and industry standards of the Russian Federation on information security of automated systems, guidelines and orders of the Federal Service for Technical and Expert Control of Russia, as well as departmental orders, instructions and regulations on information security at informatization facilities of internal affairs bodies. The analysis results in identifying the advantages and disadvantages of the specified methodology, as well as the possibilities of its use when conducting a quantitative assessment of the efficiency of access control subsystems of information security systems at the informatization facilities of internal affairs bodies. Methods. To achieve this goal, the method for system analysis of approaches used to assess the efficiency of information security tools and systems has been applied. Results. The paper presents results of analysing the main approaches used to assess the efficiency of tools and systems for information security of automated systems. The paper determines the relationship between the efficiency indicator of access control subsystems of information security systems and the main disadvantage of their use in protected automated systems of internal affairs bodies. The paper substantiates main directions of improving the existing methodology, proposes methods and indicators for quantifying the efficiency of access control subsystems (including those modified on the basis of using new information and communication technologies) of information security systems in protected automated systems of internal affairs bodies. Conclusion. The results obtained can be used to quantify the security level of existing automated systems and those being developed at informatization facilities of internal affairs bodies.


Sign in / Sign up

Export Citation Format

Share Document