scholarly journals SECURITY SYSTEMS USED WITH VIRTUALIZATION TECHNOLOGY

2019 ◽  
Vol 6 (2) ◽  
pp. 150-158
Author(s):  
Angelika Pechyonkina ◽  
Valentin Selifanov

It’s impossible to imagine a modern information system without virtualized components – servers, remote workstations (VDI), network equipment. The competent approach is necessary to protect these environments. If information system of a company processes information that is subjected to mandatory protection in accordance with requirements of Russian legislation (for example, personal data or information processed in state information systems), then only certified security devices that have passed the procedure of compliance assessment by regulators – the Federal Security Service of Russia and the FSTEC of Russia. The use of these protection means will ensure the required level of information security.

2020 ◽  
Vol 24 (2) ◽  
pp. 73-79
Author(s):  
V. A. Sizov ◽  
D. M. Malinichev ◽  
V. V. Mochalov

The aim of the study is to increase the effectiveness of information security management for state information systems (SIS) with terminal access devices by improving regulatory legal acts that should be logically interconnected and not contradict each other, as well as use a single professional thesaurus that allows understanding and describe information security processes.Currently, state information systems with terminal access devices are used to ensure the realization of the legitimate interests of citizens in information interaction with public authorities [1].One of the types of such systems are public systems [2]. They are designed to provide electronic services to citizens, such as paying taxes, obtaining certificates, filing of applications and other information. The processed personal data may belong to special, biometric, publicly available and other categories [3]. Various categories of personal data, concentrated in a large volume about a large number of citizens, can lead to significant damage as a result of their leakage, which means that this creates information risks.There are several basic types of architectures of state information systems: systems based on the “thin clientpeer-to-peer network systems; file server systems; data processing centers; systems with remote user access; the use of different types of operating systems (heterogeneity of the environment); use of applications independent of operating systems; use of dedicated communication channels [4]. Such diversity and heterogeneity of state information systems, on the one hand, and the need for high-quality state regulation in the field of information security in these systems, on the other hand, require the study and development of legal acts that take into account primarily the features of systems that have a typical modern architecture of “thin customer". Materials and research methods. The protection of the state information system is regulated by a large number of legal acts that are constantly being improved with changes and additions to the content. At the substantive level, it includes many stages, such as the formation of SIS requirements, the development of a security system, its implementation, and certification. The protected information is processed in order to enforce the law and ensure the functioning of the authorities. The need to protect confidential information is determined by the legislation of the Russian Federation [5, 6]. Therefore, to assess the quality of the regulatory framework of information security for terminal access devices of the state information system, the analysis of the main regulatory legal acts is carried out and on the basis of it, proposals are developed by analogy to improve existing regulatory documents in the field of information security.Results. The paper has developed proposals for improving the regulatory framework of information security for terminal access devices of the state information system- for uniformity and unification, the terms with corresponding definitions are justified for their establishment in the documents of the Federal Service for Technical and Export Control (FSTEC) or Rosstandart;- rules for the formation of requirements for terminals, which should be equivalent requirements for computer equipment in the “Concept for the protection of computer equipment and automated systems from unauthorized access to information ".Conclusion. General recommendations on information protection in state information systems using the “thin client" architecture are proposed, specific threats that are absent in the FSTEC threat bank are justified, and directions for further information security for the class of state information systems under consideration are identified. Due to the large number of stakeholders involved in the coordination and development of unified solutions, a more specific consideration of the problems and issues raised is possible only with the participation of representatives of authorized federal executive bodies and business representatives for discussion.


Vestnik MGSU ◽  
2020 ◽  
pp. 1570-1583
Author(s):  
Sergey A. Volkov ◽  
Tatiana V. Khripko

Introduction. Building Information Modeling (BIM) is an auspicious approach that supports management and exchange of semantically rich 3D models across design disciplines. Recently, BIM has gained widespread acceptance in the AEC industry, and it improves the efficiency and quality of the process by facilitating the early exchange of 3D building models. At different stages of the life cycle, a building information model is gradually refined from rough conceptual design to detailed individual components. The task is to develop mechanisms for machine verification (authentication) of data transmitted to/from different systems (for example, from a customer to an expert evaluation authority, from a contractor to the urban planning management information system or any other state information system) in the form of an information model of capital construction facilities or certain components of an information model. Materials and methods. To substantiate the choice of the language employed to describe machine-readable documents, various use cases of XML schemas were analyzed, including the use of the Google Trends tool. Information systems, implemented in the Russian Federation, were also considered. Most of them use the W3C XML Schema language to describe XSD schemas. Results. A consolidated list of XML schemas, necessary and sufficient to maintain stages of the life cycle of a capital construction facility in terms of interaction with the Urban Planning Management Information System is presented. To ensure interaction between the life cycle participants and state information systems, it is necessary to have the list of XML schemas approved at the federal level. The paper presents matrixes of scenarios for the application of XML schemas in the following coordinates: participants, life cycle stages. Conclusions. XML schemas can be supplemented in respect of various stages of a life cycle of a capital construction faci-lity to be verified with due regard for further methodological approaches and changes in regulatory and technical acts; new approaches and the need for this supplementation must be substantiated.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3488 ◽  
Author(s):  
Wafa Bouaynaya ◽  
Hongbo Lyu ◽  
Zuopeng Zhang

With the growing popularity of Internet of Things (IoT) and Cyber-Physical Systems (CPS), cloud- based systems have assumed a greater important role. However, there lacks formal approaches to modeling the risks transferred through information systems implemented in a cloud-based environment. This paper explores formal methods to quantify the risks associated with an information system and evaluate its variation throughout its implementation. Specifically, we study the risk variation through a quantitative and longitudinal model spanning from the launch of a cloud-based information systems project to its completion. In addition, we propose to redefine the risk estimation method to differentiate a mitigated risk from an unmitigated risk. This research makes valuable contributions by helping practitioners understand whether cloud computing presents a competitive advantage or a threat to the sustainability of a company.


2020 ◽  
Vol 15 (8) ◽  
pp. 136-145
Author(s):  
L. V. Andreeva

Currently, in the context of information technologies development and the transition to the digital technologies application in the economy and public administration, the importance of information systems, including state information systems, is increasing. In the field of state and municipal procurement, an information infrastructure has been created, the main component of which is the state unified information system (UIS), which has significant features compared to other state information systems, the effective functioning of which is of great importance to ensure the entire procurement process. The purpose of the paper is to determine the legal nature and functions of the UIS, to study the features of interaction with other information systems and the prospects for its development in the context of the digital technologies application. This goal assumes the solution of the following tasks: analysis of regulatory legal acts that establish the rules for the functioning of the UIS; determination of common features of the UIS with other state information systems and its distinctive features; study of forms of interaction of information systems with the UIS; analysis of the effectiveness of the organization of electronic document management by means of UIS; development of proposals for improving the rules for the UIS functioning.As a result of the study, it was concluded that the implementation of civil rights and obligations in the field of state and municipal procurement is carried out through the EIS; the features of the EIS as a multifunctional state information system are determined and a conclusion is made about its uniqueness; suggestions were made on the application of measures to improve the functioning of the ENI, and the use of digital technologies in the field of procurement.


2020 ◽  
Vol 22 (3) ◽  
pp. 316-324
Author(s):  
Ahmad Haidar Mirza ◽  
Dedi Irawan

Distribution of goods becomes a separate priority within a company, especially with regard to distribution routes. This condition will become complex if there are many branches in the process of distributing goods. For this reason, in this research, calculations were carried out in the process of travelling in distributing goods. To perform these calculations, a method is used, namely the saving matrix method. To carry out this implementation, a goods distribution information system is created with calculations in the distribution of goods using a saving matrix. The results of the research are in the form of information systems developed with a waterfall model with features ranging from processing goods data, customer data, demand data, shipping data, route data and saving matrix calculation data. From the resulting information system, it can also be seen clearly the distance travelled in the distribution of goods so that it can easily determine travel facilities for deliverymen.   Distribusi barang menjadi prioritas tersendiri di dalam sebuah perusahaan terutama berkaitan dengan rute distribusi. Konidisi tersebut akan menjadi komplek jika terdapat banyak cabang dalam proses distribusi barang. Untuk itu di dalam peneltian ini dilakukan dilakukan perhitungan dalam proses perjalanan dalam melakukan distribusi barang. Untuk melakukan perhitungan tersebut digunakan sebuah metode yaitu método saving matrix. Untuk melakukan implementasi tersebut maka dibuat sebuah sistema informasi distribusi barang dengan dilengkapi perhitungan dalam distribusi barang dengan saving matrix. Hasil dari penelitian berupa sistema informasi yang dikembangkan dengan waterfall model dengan fitur mulai dari pengolahan data barang, data pelanggan, data permintaan, data pengiriman, data rute dan data peritungan saving matrix. Dari sistema informasi yang dihasilkan juga dapat diketahui dengan jelas jarak tempuh dalam distribusi barang sehingga dapat dengan mudah dalam menentukan fasilitas perjalanan bagi pengantar barang.


Author(s):  
Lani Mufadilah ◽  
Yusuf Amrozi

Zuper futsal field rental is a business entity engaged in the field of rental services that require the existence of an information system. Information systems in a company play an important role in the progress and management of a company as well as in the zuper rental system that is to be able to support and provide satisfactory services to each customer. The system that exists in some futsal fields in general is still simple with menual management, most of the problems that are often encountered are the process of recording data and transactions requiring a long time. The possibility of errors in writing a data and the security of the document is not guaranteed, because many lost documents will make it difficult for you to do a data search or report printing. Designing an application in the form of a program that functions to process and simplify business processes that occur on the Zuper futsal field, starting from the data processing of tenants, leasing transactions, to printing reports are expected to be the best solution to solve problems that exist in a business entity to support efficiency and the effectiveness of working on a field rental


Author(s):  
N. Baisholan ◽  
K.E. Kubayev ◽  
T.S. Baisholanov

Efficiency of business processes in modern organizations depends on the capabilities of applied information technologies. The article describes and analyzes the role and features of audit tools and other methodological tools and models in ensuring the quality and security of information systems. The standard’s principles are reviewed, as well as the importance of meeting business needs. In order to protect virtual values in a company’s system environment, the importance of using information security models is revealed. Practical proposals in risk management and information security in information technology are analyzed through the COBIT standard. Measures for protecting the information system of an organization from accidental, deliberate or fake threats are considered. The possibility of using one of the real information security models by the information recipient or provider in accordance with the requirements of external processes is reported. Furthermore, in connection with increase in the number of attack methods and techniques and development of their new tools and vectors, the need to improve and ways to ensure information security are being considered. The essential tasks of security audit are considered, and the stages of their implementation are described. With regard to security of information systems, an analytical model is proposed for determining vulnerability’s numerical value.


2019 ◽  
Vol 4 (1) ◽  
pp. 50-57
Author(s):  
Lukman Sunardi ◽  
Andri Anto Tri Susilo

Abstrak Sistem informasi akuntansi merupakan jantung bagi sebuah perusahaan. Sistem informasi akuntansi membuat sebuah perusahaan mampu melakukan pengendalian dan memudahkan perusahaan dalam meningkatkan kinerjanya. Salah satu bagian dari sistem informasi akuntansi adalah sistem penjualan dan piutang. Penelitian ini dilakukan pada perusahaan distributor yang bergerak di bidang penjualan alat-alat elektrikal, mekanikal, dan telekomunikasi. Perusahaan tersebut sedang berkembang pesat dengan jumlah transaksi penjualan yang cukup banyak dan kompleks setiap harinya, namun masih menggunakan sistem manual sehingga kurang efektif dan efisien. Maka dari itu penulis mengangkat judul prancangan system e-accounting pada PT. Mandiri Agung Lubuklinggau.  Pada penelitian ini penulis menggunakan perancangan system menggunakan United modeling language (UML) dan pada penelitian ini penulis mengunakan metode deskriptif dimana penggunaan metode dimaksudkan agar kebenaran yang diungkapkan benar-benar berdasarkan bukti ilmiah yang kuat adapun hasil dari penelitian ini maka dapat disimpulkan dengan adanya system e-accounting ini memperbaiki kelemahan yang ada pada sistem informasi akuntansi penjualan dan piutang yang sedang berjalan. Serta meningkatkan pengendalian intern perusahaan serta meminimalisir kecurangan dan human error yang dilakukan karyawan. Kata kunci—PHP,Akuntansi, E-Accounting   Abstract  Accounting information systems are the heart of a company. Accounting information systems make a company capable of controlling and making it easier for companies to improve their performance. One part of the accounting information system is the sales and accounts receivable system.This research was conducted at a distributor company engaged in the sale of electrical, mechanical, and telecommunications equipment. The company is growing rapidly with a number of sales transactions that are quite numerous and complex every day, but still use the manual system so that it is less effective and efficient. Therefore the author raised the title of the design of e-accounting system at PT. Mandiri Agung Lubuklinggau.In this study the author uses the system design using the United modeling language (UML) and in this study the author uses descriptive methods where the use of the method is intended so that the truth revealed is really based on strong scientific evidence while the results of this study can be concluded with the existence of system e -accounting fixes weaknesses that exist in the current sales and accounts receivable accounting information system. And improve internal control of the company and minimize fraud and human error by employees. Keywords—PHP,Accounting,E-Accounting


Author(s):  
Susi Susilowati

PT. Medista Utama is a company engaged in the distribution of medical devices. We have implemented an information system in the inventory section that is used to control the movement of products in the company. The system used must be able to manage, convey and maintain information security properly. So it is necessary to carry out an audit that aims to evaluate the information system governance that is running and ensure that the existing procedures support the existing business processes in the company. The audits were conducted following the standards of the COBIT 4.1 Framework for IT governance. This study will focus on the Delivery Service and Support (DSS) domain to analyze several aspects of IT that are currently running in this company, from the level of system security used to the management carried out by the system. In this domain, the research is focused on the DS5, DS10, and DS11 sub-domains. From the research results it is known that DS5 is at the level of 1.3; DS10 and DS11 are at level 2 (Repetitive but Intuitive). The conclusion is the level of capability obtained from the inventory information system of PT. Medista Utama is still below the expected level. And many improvements are needed to maximize the company's performance to achieve the expected Maturity Level value.


Author(s):  
Andrey M. Tararin ◽  

The purpose of the study is to reveal the features of the development of information support for urban planning in the context of digital transformation. The article summarizes new material on the topic under study: the latest amendments to the Urban Planning Code of the Russian Federation and relevant by-laws, prospects for the implementation of the national program "Digital Economy of the Russian Federation". The study provides a historical analysis of the development of information sup-port for urban planning. Particular attention is paid to the creation in the subject of the Russian Federa-tion of state information systems for ensuring urban planning with the functions of automated infor-mation and analytical support for the exercise of powers in the field of urban development (GISFUD) and the role of GIS technologies in its implementation. As a result of the study, there was proposed a scheme of information interaction between GISFUD and other information systems, including the Federal State Information System of Territorial Planning, the Federal State Information System for maintaining the Unified State Register of Real Estate, the Federal Information Address System, and the Unified State Register of expert conclusions for design documentation of capital construction facilities and the State Information System for maintaining a Unified Electronic Cartographic Basis for the ex-change of spatial data in order to provide automated support for the exercise of powers in the field of urban planning. The article defines the main trend of the digital transformation of urban planning ac-tivities, characterized by the transition to the provision of integrated services in the construction indus-try and the introduction of super services, as well as by the distribution of information models of capi-tal construction facilities and 3D printing in construction. It gives recommendations for digital trans-formation parameters in urban planning.


Sign in / Sign up

Export Citation Format

Share Document