scholarly journals CHOICE OF MEANS OF PROTECTION OF INFORMATION IN STATE INFORMATION SYSTEMS

2019 ◽  
Vol 9 ◽  
pp. 35-38
Author(s):  
Valentin Selifanov ◽  
Sofya Stepanova ◽  
Nikita Strigari

The article discusses the features of the choice of information security tools for state information systems. The main types of SPI, which were used on the territory of Russia before, as well as the means used now, are considered. The results of work, carried out by the FSTEC and FSB of Russia, on the introduction of the classification of SPI and measures taken by the GIS operator are presented. Tendencies of development and creation of new means of information protection are defined.

2020 ◽  
Vol 2020 (2) ◽  
pp. 36-42
Author(s):  
A. Metelkov

In theory and in practice, there is a problem of removing uncertainty in the implementation of technical measures due to the unclear right-hand regulation of classification of measures to ensure the security of data automatically processed in information systems. In the article, based on the application of set theory, it is proposed to remove this uncertainty by selecting groups of measures to ensure the security of information. Information protection in the Federal law "on information, information technologies and information protection" is the adoption of legal, organizational and technical measures. However, in practice, in the system of measures to ensure the information security of objects of protection, they are found not only in a "pure" form, but also in a close relationship, interaction with each other (organizational-legal, organizational-technical, technical-legal), and very often can not be implemented independently.


2019 ◽  
pp. 6-11
Author(s):  
Alexei Babenko

The urgency of the issue of information security in state information systems is justified by the high demand for systems of this class. The effectiveness of public information systems largely depends on the level of their security. Based on this, we formulate the purpose of this study: formalization of the process of managing the composition of the system of information technical protection in state information systems. The paper deals with the problem of managing the composition of the system of information technical protection in state information systems. The author analyzes threats to information security in state information systems. The article defines the criteria of evaluating technical means of information protection in state information systems. The researcher develops a formal model of managing the structure of information technical protection system in state information systems. The developed model of managing the structure of information protection technical means in state information systems allows to determine the most effective structure of the information protection system in state information systems. If the requirements for the analyzed means of information security change, then changing the values in the optimal vector, you can come to the right decision. Consequently, the developed model of managing the structure of information protection technical means in state information systems is universal and effective.


Author(s):  
Iryna Sopilko

The study gives definitions of information security and related terms, such as cybersecurity, national security, and others, indicates the goals, objects, subjects of the concepts under consideration. The author also considers the features of the foundation and development of the information society in Ukraine, the components of its state information policy for ensuring information security, and identifies the key operations of activity of state bodies in the information sphere. The approaches of scientists who studied certain aspects of national and information security were analyzed, based on their work valuable conclusions were drawn and the conceptual basis of the article was formed. Independently, the definition and characteristics of external and internal threats to the information security of the country are given, methods for solving the problems arising in this connection are introduced, ways of ensuring the information security of the state are indicated. Information security in this study is considered as the central element of the national security of Ukraine, as well as a problematic issue in the field of information protection and ensuring the high-quality functioning of the information space. The author made an in-depth analysis of the existing regulatory and legal instruments for ensuring information security, pointed out their shortcomings, and gave recommendations for their further advancement. Also, recommendations are given to improve the current situation with the regulation of information security in the country, the directions of the state information policy are suggested and ways to ensure the continuity of the functioning of the information security system of Ukraine are indicated.


2019 ◽  
Vol 6 (1) ◽  
pp. 203-208
Author(s):  
Julia Isaeva ◽  
Valentin Selifanov

The need for conformity assessment of information security tools at significant objects of critical information infrastructures is demonstrated. In the absence of necessary criteria description for information systems, a possibility of threats implementation appears, which will lead to disruption of functioning of significant objects.


2020 ◽  
Vol 24 (2) ◽  
pp. 73-79
Author(s):  
V. A. Sizov ◽  
D. M. Malinichev ◽  
V. V. Mochalov

The aim of the study is to increase the effectiveness of information security management for state information systems (SIS) with terminal access devices by improving regulatory legal acts that should be logically interconnected and not contradict each other, as well as use a single professional thesaurus that allows understanding and describe information security processes.Currently, state information systems with terminal access devices are used to ensure the realization of the legitimate interests of citizens in information interaction with public authorities [1].One of the types of such systems are public systems [2]. They are designed to provide electronic services to citizens, such as paying taxes, obtaining certificates, filing of applications and other information. The processed personal data may belong to special, biometric, publicly available and other categories [3]. Various categories of personal data, concentrated in a large volume about a large number of citizens, can lead to significant damage as a result of their leakage, which means that this creates information risks.There are several basic types of architectures of state information systems: systems based on the “thin clientpeer-to-peer network systems; file server systems; data processing centers; systems with remote user access; the use of different types of operating systems (heterogeneity of the environment); use of applications independent of operating systems; use of dedicated communication channels [4]. Such diversity and heterogeneity of state information systems, on the one hand, and the need for high-quality state regulation in the field of information security in these systems, on the other hand, require the study and development of legal acts that take into account primarily the features of systems that have a typical modern architecture of “thin customer". Materials and research methods. The protection of the state information system is regulated by a large number of legal acts that are constantly being improved with changes and additions to the content. At the substantive level, it includes many stages, such as the formation of SIS requirements, the development of a security system, its implementation, and certification. The protected information is processed in order to enforce the law and ensure the functioning of the authorities. The need to protect confidential information is determined by the legislation of the Russian Federation [5, 6]. Therefore, to assess the quality of the regulatory framework of information security for terminal access devices of the state information system, the analysis of the main regulatory legal acts is carried out and on the basis of it, proposals are developed by analogy to improve existing regulatory documents in the field of information security.Results. The paper has developed proposals for improving the regulatory framework of information security for terminal access devices of the state information system- for uniformity and unification, the terms with corresponding definitions are justified for their establishment in the documents of the Federal Service for Technical and Export Control (FSTEC) or Rosstandart;- rules for the formation of requirements for terminals, which should be equivalent requirements for computer equipment in the “Concept for the protection of computer equipment and automated systems from unauthorized access to information ".Conclusion. General recommendations on information protection in state information systems using the “thin client" architecture are proposed, specific threats that are absent in the FSTEC threat bank are justified, and directions for further information security for the class of state information systems under consideration are identified. Due to the large number of stakeholders involved in the coordination and development of unified solutions, a more specific consideration of the problems and issues raised is possible only with the participation of representatives of authorized federal executive bodies and business representatives for discussion.


2018 ◽  
Vol 6 (24) (1-2) ◽  
pp. 39-58
Author(s):  
Krzysztof Liderman ◽  
Adam Patkowski

W artykule przedstawiono propozycję zintegrowanego ujęcia zagadnień oceny stanu ochrony informacji w złożonych systemach informacyjnych. Fundamentem tej propozycji jest diagnostyka techniczna oraz bezpieczeństwo informacyjne. Przedstawiono m.in. zagadnienia wykonywania badań dostarczających podstaw do takiej oceny: testów penetracyjnych oraz audytu bezpieczeństwa teleinformatycznego. W ostatnim punkcie opisano krótko metodykę LP-A wykonywania audytu bezpieczeństwa teleinformatycznego integrującą różne typy badań oraz ułatwiającą wykorzystanie różnych, w zależności od potrzeb, wzorców audytowych. ABSTRACT: The paper presents a proposal of an integrated approach to the issues of assessing the state of information protection in complex information systems. The foundation of this proposal is technical diagnostics along with information security. Featured, among others issues of performing tests providing the basis for such an assessment: penetration tests and IT security audit. The last chapter of the paper briefly describes the LP-A methodology of performing an IT security audit that integrates various types of research, aiding various audit patterns, depending on the needs.


2019 ◽  
Vol 9 ◽  
pp. 54-60
Author(s):  
Alina Zhumaeva ◽  
Valentina Yalbaeva ◽  
Polina Zviagintcheva ◽  
Valentin Selifanov

The article deals with the problem of choosing the means of information security in the state information system, namely firewalls and intrusion detection. Thе problem is relevant since information security is in demand more than ever.


2019 ◽  
Vol 6 (1) ◽  
pp. 115-121
Author(s):  
Anastasiya Goldobina ◽  
Valentin Selifanov

Protection components of state information system represent the uniform mechanism capable to protect confidential information. If one of protection elements does not work effectively, it will become a problem for the entire information security system. Public information systems need to take into account all available ways to prevent information leakage, for this, operators should evaluate the efficiency. This article proposes possible solutions of the problem.


2020 ◽  
pp. 183-190
Author(s):  
І. Є. Іванов

The article considers topical issues of information security in the activities of the National Police of Ukraine. It is determined that the main problem of information security in the law enforcement sphere arose due to the global contradiction between the possibilities of information technologies and the threats of their use. The settlement of the existing public information relations alone is insufficient, as the legislation does not keep pace with technical progress. The definition of "information security" is considered and the author's definition of this concept is offered. The main normative legal acts regulating the activity of the National Police in this direction are analyzed. It is stated that information security of the National Police of Ukraine is provided in two forms: organizational (related to the circulation, collection, processing, storage, use and protection of information); legal (preparation and approval of regulations (orders, instructions), development of regulations, instructions, algorithms, plans, etc.). The key to information protection is the administration of information systems. The European experience of information protection in the law enforcement sphere is considered. Attention is drawn to the need to implement a system of modern international information security standards ISO / IES series 27000, which is constantly updated. It is theoretically substantiated that: increasing the efficiency of the National Police of Ukraine can be solved through the introduction of a reliable information security system; to achieve the highest level of information security of law enforcement agencies it is necessary not only to improve the current legislation, but also to have a mechanism for its implementation; Security and protection in the information systems of the National Police should be based on a comprehensive approach to building a protection system, which provides for the integration into a single set of necessary measures and means of information protection at all levels of the information system.


Author(s):  
Iryna Sopilko

The study gives definitions of information security and related terms, such as cybersecurity, national security, and others, indicates the goals, objects, subjects of the concepts under consideration. The author also considers the features of the foundation and development of the information society in Ukraine, the components of its state information policy for ensuring information security, and identifies the key operations of activity of state bodies in the information sphere. The approaches of scientists who studied certain aspects of national and information security were analyzed, based on their work valuable conclusions were drawn and the conceptual basis of the article was formed. Independently, the definition and characteristics of external and internal threats to the information security of the country are given, methods for solving the problems arising in this connection are introduced, ways of ensuring the information security of the state are indicated. Information security in this study is considered as the central element of the national security of Ukraine, as well as a problematic issue in the field of information protection and ensuring the high-quality functioning of the information space. The author made an in-depth analysis of the existing regulatory and legal instruments for ensuring information security, pointed out their shortcomings, and gave recommendations for their further advancement. Also, recommendations are given to improve the current situation with the regulation of information security in the country, the directions of the state information policy are suggested and ways to ensure the continuity of the functioning of the information security system of Ukraine are indicated.


Sign in / Sign up

Export Citation Format

Share Document