scholarly journals THE FORMATION OF AN EFFECTIVE SYSTEM OF INFORMATION PROTECTION IN THE DIGITAL EDUCATIONAL SPACE

Author(s):  
Э.Д. Алисултанова ◽  
Д.С. Бицалов

Данная статья направлена на формирование эффективной системы защиты информации. В настоящее время ввиду совершенствования информационных технологий все более актуальной становится проблема защиты информации, так как вместе с улучшением методов защиты информации, к сожалению, развиваются и методы утечки информации. В данной статье рассмотрена одна из актуальных систем защиты информации, система ViPNet Client. Программный комплекс ViPNet Client предназначен для защиты рабочих мест корпоративных пользователей. ViPNet Client надежно защищает от внешних и внутренних сетевых атак за счет фильтрации трафика. Кроме того, ПК ViPNet Client обеспечивает защищенную работу с корпоративными данными через зашифрованный канал, в том числе для удаленных пользователей. This article is aimed at the formation of an effective system of information security. Currently, in view of the improvement of information technology, the problem of information security remains more urgent, as together with the improvement of information security methods, information leakage methods are unfortunately developing. This article describes one of the current information security systems, ViPNet Client system. The ViPNet Client servage software package is designed to protect the workplaces of corporate users. ViPNet Client podaressis protects the cigar from external and internal network attacks by filtering the representation of the traffic. In addition, the ViPNet Glukharev Client PC provides secure nonadministrative work with corporate data shunning through an encrypted channel, including for remote eliminated users.

Author(s):  
Estera Pietras

Due to the exchange of information, organizations are encouraged to create an effective system of information flow that should be monitored on a regular basis in order to minimize the risk of emergence of threats. Due to modern technical solutions of security systems, it is much more possible and accessible than a few years ago. For this purpose, proper identification and classification of threats is necessary. This constitutes the starting point for considering the role and the essence of risk. The article highlights the aspects related to ensuring information security as a whole and data protection- the most important assets of business entities.


2020 ◽  
pp. 12-21
Author(s):  
Marina Ozhiganova ◽  
Anastasia Kalita ◽  
Yevgeny Tishchenko

Over the past few decades, there has been a tendency to minimize the participation of the human factor in various production and other processes. This process is implemented through the mass introduction of automated systems (as). Human-machine complexes are currently the most common and productive model of activity. At the current stage of technology development, the process of automating human activity is only an intermediate link on the way to eliminating human intervention. This area is most relevant for systems that pose a potential and real threat to human health and life (for example, manufacturing plants) or systems that are threatened by humans (for example, transport systems). The second group includes the sphere of information security. The paper considers the basics of the organization of adaptive information protection systems, their application areas for information protection and methods of building models of adaptive information protection systems in the context of their application for protection against leakage through technical channels. The authors propose a generalized model of the adaptive information protection system against leakage through technical channels.


Author(s):  
A. M. Kadnova

Objectives At present, in accordance with the requirements of the guiding documents of the Federal Service for Technical and Export Control (FSTEC) of Russia, as well as international standards in the development and operation of protected automated systems, it is necessary to evaluate the effectiveness (general utility) of information protection systems. The article is devoted to the development of a method for assessing the ergotechnical characteristics of software information security systems for use the assessment of the general utility of such systems. The aim of the work is to develop a methodology for assessing the probabilistic indicator of the timeliness of typical operations for the administration of information security systems.Method To achieve this goal, user groups were created in order to perform typical administrative operations within the information protection system. The operation time for each group, recorded using the IOGraphV1.0.1 tool, was utilised to calculate the probabilities of timely execution of typical operations by the administrator according to a truncated normal distribution formula.Results An assessment of a probabilistic indicator was carried out in order to evaluate the timeliness of operations performed by the administrator of the information protection system.Conclusion The results can be used in a comprehensive assessment of the effectiveness (reliability) of the automated functioning of information security software systems when modelling and analysing the security of special-purpose informatisation facilities.


2018 ◽  
pp. 23-29
Author(s):  
Taimuraz Zangiev ◽  
Elizar Tarasov ◽  
Vladimir Sotnikov ◽  
Zalina Tugusheva ◽  
Fatima Gunay

Much attention in the sphere of information technology is paid to the aspects of information security, due to the growing damage. As a result of damage increase, there is a quantitative and qualitative growth in the market of software and hardware for information security. At the same time, new alternatives to existing information security tools are being developed, as well as means of protection against new vectors of attacks associated, for example, with the spread of the concept of ‘Internet of things’, big data and cloud technologies. At the same time, the analysis of information security incidents at enterprises that actively use information security tools shows that the use of information security systems does not provide the required level of protection for information objects that remain susceptible to attacks. According to recent studies, the share of corporate systems in the Russian Federation containing critical vulnerabilities associated with incorrect configuration of information security systems makes up more than 80 %. At the same time, the costs of Russian companies to ensure information security are increasing by an average of 30 % per year. The article presents current problems related to the conflicting requirements to the design of complex information security systems (CISS). The authors suggest an approach to selection and configuration of the CISS facilities based on the role model of M. Belbin in the interpretation of the CISS as a command that will allow building an integrated information protection circuit. The cases of manifestation of synergism and emergence, which ensure the effective functioning of the system, have been described.


Author(s):  
Kira Aleksandrovna Vrublevskaya ◽  
Albert Iscandarovich Azhmukhamedov ◽  
Nadezhda Valerievna Daviduk

The article considers the problem of the effectiveness of information protection system from the human factor and, in particular, of the influence of management measures on the social subsystem on the overall level of information security. It has been stated that risk of classified information leakage occurs due to primary uncertainty of staff behavior and lack of the staff loyalty to the methods of management. It is claimed that the nature of dependency between the regulation of activities and the effectiveness of the work of personnel and compliance with information protection measures testify that the strengthening institutional measures beyond a certain "mark" leads to a decrease in performance and a decrease of information security. The problem solving is in searching and applying methods and mechanisms aimed at changing the state of a social subsystem in the needed direction for a decision taking person. There has been suggested the method that allows selecting optimal level of institutional measures of impact on personnel, exceeding which adversely affects to the effectiveness of the information protection system. It is based on a method of nonstrict ranging for certain activities that need reglamentation, and calculating average level of the staff loyalty to the introduced measures. The experimental study results and the computational example are given


2019 ◽  
Vol 191 (1) ◽  
pp. 26-35
Author(s):  
Estera Pietras

Due to the exchange of information, organizations are encouraged to create an effective system of information flow that should be monitored on a regular basis in order to minimize the risk of emergence of threats. Due to modern technical solutions of security systems, it is much more possible and accessible than a few years ago. For this purpose, proper identification and classification of threats is necessary. This constitutes the starting point for considering the role and the essence of risk. The article highlights the aspects related to ensuring information security as a whole and data protection – the most important assets of business entities.


Author(s):  
Olha Dehtiarova

The scientific article considers the issue of information protection during the investigation of criminal proceedings, informationsecurity. The position of researchers and practitioners on information security at the stage of pre-trial investigation of criminal procee -dings is studied.The provisions of the Law of Ukraine «On Information», the Strategy for the Development of the System of the Ministry of InternalAffairs of Ukraine until 2020, the Regulations on the Procedure for Maintaining the Unified Register of Pre-trial Investigations toEnsure Information Security in Proceedings are analyzed.The introduction of information technology in criminal procedure has become an urgent issue, and their application has necessitatedthe need to address the issue of information security in criminal proceedings. When investigating proceedings, the investigatorsuse databases and enter into these databases information that must be securely protected. Information in criminal proceedings needsspecial protection, as it is subject to encroachment by interested parties on its disclosure and transmission.Ensuring information security is to create appropriate conditions for the storage, processing and exchange of information that inany way relates to the investigation of criminal proceedings. Interference in the activities of pre-trial investigation bodies through informationsystems is an undermining of the principle of independence of the law enforcement system. It is important not only to combatunauthorized interference, but also to increase the degree of responsibility for such actions. Because all data collected in criminal proceedingsare protected by law and are a secret of the investigation.Information security in criminal proceedings is the protection of the information environment of electronic criminal proceedingswith the help of means and methods of information storage, which ensures the proper functioning of criminal proceedings and facilitatesthe implementation of its tasks.


Author(s):  
E. A. Rogozin ◽  
D. G. Silka ◽  
O. A. Gulyaev

Objectives. In order to determine the security of a special-purpose informatisation object, it is necessary to calculate the effectiveness indicators of information security (IS) measures aimed at preventing unauthorised access (UA) threats associated with information leakage through technical (acoustic) channels. In order to determine the actual channels of information leakage, it is necessary to develop a list of actions to neutralise potential threats, including the development of an information protection system for a special-purpose informatisation object.Method. A security assessment of the special-purpose informatisation object is carried out using expert documentary and instrumental methods.Results. The results of evaluating the indicators of protection against information leakage through the air (acoustic) channel are presented and aspects of improving special measures for protecting information at the special-purpose informatisation object are identified.Conclusion. Due to its relevance, the direction of this study requires further development of organisational and technical measures to implement the requirements of regulatory documents on the protection of information in special-purpose informatisation objects. 


2013 ◽  
Vol 457-458 ◽  
pp. 1152-1155
Author(s):  
Yong Xian Yang ◽  
Jie Tu ◽  
Yao Jun Liu ◽  
Chun Xiang Liu

With the level of China's power information technology increased, any information security problem appear in power system are likely to endanger the safe operation of power grid. USB dongle is a popular authentication security tool which can effectively prevent the illegal use of software. In this paper, use electrical simulation training software as an example, apply encryption lock as an important tool for the security protection of electric power simulation training software, introduce the principle and role in information security protection of encryption lock in detail.


Sign in / Sign up

Export Citation Format

Share Document