The Systemic Approach to Information Protection in Relation to Risk in an Integrated Information Security System

2015 ◽  
Vol 760 ◽  
pp. 689-694
Author(s):  
Nicolae Anton ◽  
Anișor Nedelcu

This paper presents an approach to the risk of information security. By taking into consideration how critical it is for a system, each category of information should be associated with a correspondent level of security risk and each level of security risk must be defined by appropriate measures to control the risks for information security. Equally important is how many levels of security risk are defined for information, or how they are classified. It is critical, however, that the model adopted reflects all the objectives that the system requires.

Author(s):  
Ibrahim Boubacar ◽  
Marina Borisovna Budko ◽  
Mikhail Yurievich Budko ◽  
Alexei Valerievich Guirik

As a result of the work focused on improving the efficiency of the information security system through the development of an ontological model and an approach based on it to ensure information security (IS) risk management, a flexible result was obtained, which is designed to ensure an increase in the efficiency of the information security system by reducing the time spent on managerial decision-making. At the end of the work, a comparative analysis of existing approaches and techniques to information security risk management and the described approach was carried out. Based on the developed ontology and approach, highly intelligent information security risk management systems and the information security system can be created on its basis.


2020 ◽  
Vol 2020 (2) ◽  
pp. 43-49
Author(s):  
D. Fedorov ◽  
A. Verzilova ◽  
V. Khoroshenko ◽  
M. Buinevich

The article discusses issues related to the necessary stage components of designing business games for teaching students to build an integrated information security system at an enterprise: features of the analysis of the initial data of an economic entity, the need to conduct a risk assessment in the context of the dynamics of the external world, ensuring the variability of building a protection strategy, forming an objective assessment the effectiveness of the protection system built by the participants.


2021 ◽  
Vol 6 ◽  
pp. 235-239
Author(s):  
Anton V. Obidenko ◽  
Aelita V. Shaburova

The relevance of information security research aimed at reducing information risks and optimizing enterprise costs for information protection. The results make it possible to increase the degree of information protection at enterprises by using methods, algorithms and practical procedures in the formation of an information security system aimed at reducing information risks.


2021 ◽  
Vol 4 ◽  
pp. 66-73
Author(s):  
M.V. Buinevich ◽  
◽  
V. V. Pokussov ◽  
K.E. Izrailov ◽  
◽  
...  

The article describes a model of threats arising from information and technical interaction between subsystem modules after their integration into a unified information protection system. The terminological base used in this subject area is defined. An ontological model is given that determines the relationship between the basic concepts. A description of the six main threats of interaction that make up the model is given, indicating the following characteristics: the source of the threat’s vulnerability, the method of its implementation, the object of the attack, the consequences of implementation in terms of violation of internal information security and damage to the performance of the integrated information protection system. The differences of this model from the typical ones used in organizations are given.


Author(s):  
V.V. Pokussov

The article deals with the problem of designing protocols for information and technical interaction, which have a sign of correctness. For this, its model is built in graphical and analytical form, as well as using a modified adjacency matrix. A classification of modules participating in the interaction is proposed, namely the following: terminal sensor and executor, degenerate handler, object storage, intermediate handler. Five correctness requirements for the protocol are introduced: the need and sufficiency of exchange objects, input and output terminality of modules, and their involvement. For each of the requirements, a formal definition is given - in terms of an adjacency matrix, as well as an algorithm for their verification. The synthesized requirements and algorithms are used for the author›s protocol of information and technical interaction in an integrated information security system. As a result, the correctness of the protocol is proved.


2021 ◽  
Vol 12 (4) ◽  
pp. 19-28
Author(s):  
Oleksandr Laptiev ◽  
Valentyn Sobchuk ◽  
Andrii Sobchuk ◽  
Serhii Laptiev ◽  
Tatiana Laptieva

In modern conditions, an important role in ensuring the information security of the enterprise and especially its economic component belongs to the processes of information security of the state as a whole. The key role in building security systems of information resources as components of national information resources of the state is played by theory and practice, in which the scientific and methodological basis is the basis for making sound and effective management decisions of the information security of the state at all levels. The article analyzes the approaches to estimating the assessment of economic costs for the information security system. The base model is selected. Using the basic model of assessing the level of protection of information in the social network from external influences on the information social resource, improvements were made to assess the economic feasibility of implementing a mechanism of technical means of information protection in social networks depending on the value of information. The improvement is based on the assumption that the amount of funds allocated by the attacking party is equal to the value of the information, the value of the information is the same for both parties, and the opposing parties are on equal terms. The main parameters on which the efficiency of the proposed model of estimating economic costs depends. The efficiency of the proposed model of estimating economic costs depends on the accuracy of formulating the probability of success of protection and determining the value of information. The prospect of further research and development may be aimed at taking into account in the model additional factors that affect the estimation of costs for the information security system, which will allow calculations to be performed with greater accuracy.


Sign in / Sign up

Export Citation Format

Share Document