MATHEMATICAL MODELING OF INVESTMENT ALLOCATION STRATEGY FOR INFORMATION SECURITY SYSTEM ORGANIZATION

Author(s):  
Ольга Николаевна Яркова ◽  
Анастасия Сергеевна Яркова ◽  
Алена Владимировна Труфанова

В работе предложен алгоритм формирования стратегии распределения инвестиций на улучшение защитных свойств системы по уровням доступа, обеспечивающей, при выделенных финансовых средствах, наилучший уровень надежности многоуровневой системы защиты информации в целом. In this article, we propose an algorithm for forming a strategy for allocating investments to improve the security properties of the system by access levels, which provides the best level of reliability of a multi-level information security system as a whole with allocated financial resources.

Author(s):  
Olga Nikolaevna Yarkova ◽  
◽  
Anastasiya Sergeevna Yarkova ◽  

The paper presents a model of nonlinear programming that allows us to determine the optimal distribution of costs for improving the protective properties of a multi-level information security system that minimizes the risk of unauthorized access to data for a system described by the Markov model. A study of the protective properties depending on the allocated investments of the system was carried out.


2014 ◽  
Vol 7 (30) ◽  
pp. 7
Author(s):  
Igor Vitalievich Kotenko ◽  
Igor Borisovich Saenko ◽  
Andrey Vladimirovich Chernov ◽  
Maria Alexandrovna Butakova

Author(s):  
Wei-Sheng Liu ◽  
shanshan zhao ◽  
Zhenbin Wang ◽  
Yuanying Lin ◽  
Bin Yu

Nowadays, with the development of technology, the safely performance of traditional single- or dual-mode luminescent materials used for anti-counterfeiting has been significantly reduced due to their single and predictable readout...


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


Author(s):  
Xiaoqi Lu ◽  
Yu Gu ◽  
Lidong Yang ◽  
Baohua Zhang ◽  
Ying Zhao ◽  
...  

Objective: False-positive nodule reduction is a crucial part of a computer-aided detection (CADe) system, which assists radiologists in accurate lung nodule detection. In this research, a novel scheme using multi-level 3D DenseNet framework is proposed to implement false-positive nodule reduction task. Methods: Multi-level 3D DenseNet models were extended to differentiate lung nodules from falsepositive nodules. First, different models were fed with 3D cubes with different sizes for encoding multi-level contextual information to meet the challenges of the large variations of lung nodules. In addition, image rotation and flipping were utilized to upsample positive samples which consisted of a positive sample set. Furthermore, the 3D DenseNets were designed to keep low-level information of nodules, as densely connected structures in DenseNet can reuse features of lung nodules and then boost feature propagation. Finally, the optimal weighted linear combination of all model scores obtained the best classification result in this research. Results: The proposed method was evaluated with LUNA16 dataset which contained 888 thin-slice CT scans. The performance was validated via 10-fold cross-validation. Both the Free-response Receiver Operating Characteristic (FROC) curve and the Competition Performance Metric (CPM) score show that the proposed scheme can achieve a satisfactory detection performance in the falsepositive reduction track of the LUNA16 challenge. Conclusion: The result shows that the proposed scheme can be significant for false-positive nodule reduction task.


2018 ◽  
Vol 7 (4.38) ◽  
pp. 82
Author(s):  
Aleksey Valentinovich Bogdanov ◽  
Igor Gennadievich Malygin

The paper considers the conceptual provisions of building a promising cognitive information security system of the museum complex on a cyber-physical basis. The stratified model of cognitive information security system of the museum complex was presented. It was shown that the key technological platform for the security of the museum complex is information and network technologies integrated (converged) with the technologies of industrial artificial intelligence. The generalized structural scheme of the cognitive cycle of the information security system of the museum complex was considered. The characteristic of the basic processes realized in a cognitive contour was given.   


Author(s):  
Mykola Ryzhkov ◽  
Anastasiia Siabro

Achievements in the sphere of automatization and telecommunication are an essential component of transformation of the international peace and security system. This article presents, that consequences of changes are of a dual character. On the one hand, new technologies are becoming an important component of society modernization strategies in developing countries, on the other hand, they can be used for armament modernization or creation of new means of confrontation in modern international relations. APR countries face the most relevant issue of information technologies usage. The article deals with the process of discussion of new challenges and threats to international security, emerging as a result of development and large-scale implementation of information-communication technologies. Positions of states regarding the adoption of resolution in the sphere of international information security were studied through examples of Japan, India, and China. It is proved in the article, that information technologies have become an important component of the security system in the world. Technologies usage may lead to steady international development as well as to information arms race. That is why working out a common position on international information security issues is of crucial importance. It is within the framework of the UN, that different states of the world are given an opportunity to express their visions of the problem of international information security and work out common approaches to its solution. The article shows, that states’ positions have similar as well as different features. For instance, all states express concern regarding possible limitation of technology transfer for the establishment of a more controlled international political environment. But states’ positions have major differences as to mechanisms of information security provision. Thus, Japan and India strive to achieve a balanced system of international information security, which should at the same time have preventive mechanisms against the emergence of threats in the information and science and technology spheres and guarantee continuation of scientific-technological development, which is a crucial component of development and modernization strategies in many countries of the world. China came forward with position of strong regulation of international information security issues and suggested framing of corresponding regulations of the states’ conduct in the cyberspace.


Sign in / Sign up

Export Citation Format

Share Document