ANALYSIS OF THE STRUCTURE OF THE INFORMATION SECURITY SYSTEM

Authors

  • L. Degtyareva
  • М. Miroshnykovа
  • S. Voloshko

DOI:

https://doi.org/10.26906/SUNZ.2019.2.078

Keywords:

information security, information protection system, information threats, unauthorized access, architecture optimization, access control

Abstract

The article analyzes the priority elements of the information protection system architecture from the standpoint of the effectiveness of its work. The system includes modules for registering, recording and restricting access based on approved norms and rules, encrypting information transmitted or stored, reserving information resources and ensuring integrity. Analyzed the main components of information security, monitoring the effectiveness of measures taken and measures taken to protect information using technical means. It is advisable to use all these modules as mandatory components of an information protection system, although the vast majority of threats to an information system can be implemented only during the operation of a computing system. The information security system is a structural unit of an information system; therefore, it is a structural, functional and organizational component that reproduces the architecture of the protected system. Continuity of control is necessary for the continuous protection of all elements of the system. It must be reliable and operate smoothly, both in the active and in the passive state of the information system. Enhance the security of any object can be achieved through a multi-level and multi-component construction of the protection system. In this case, the implementation of any threat will be able to influence the protected object only if all established protection levels are overcome, taking into account the entire set of protection requirements and factors affecting protection.

Downloads

References

М.М. Присяжнюк, Бєлашевич Я.С. Інформаційна безпека України в сучасних умовах/ Військово-спеціальні науки, №30 (1) − К.: Вісник Київського національного університету імені Тараса Шевченка, 2013. − с. 37-41.

Степанов Е.А., Корнеев И.К. Информационная безопасность и защита информации. – М.: ИНФРА-М, 2001. – 304 с.

Кормич Б.А. Інформаційна безпека: організаційно-правові основи: Навч. посібнік. – К.:Кондор, 2004. – 384 с.

Хорошко В.А., Чекатков А.А. Методы и средства защиты информации – К.: Юниор, 2003. – 504 с.

Семкин С.Н., Беляков Э.В., Гребенев С.В. и др. Основы организационного обеспечения информационной безопасности объектов информатизации − М.: Издательство "Гелиос АРВ", 2005. − 186 с.

Degtyareva L., Miroshnykovа М. The problems of the security of information transport and logistics systems/ // Theses of international scientific and practical conference “Globalization of scientific and educational space. Innovations of transport. Problems, experience, prospects”, May 2018, Italy. – С. 32-34.

Безштанько В. Аналіз існуючих програмних засобів та методик оцінки стану інформаційної безпеки організації // Бизнес и безопасность. – 2007. – №1. – С. 32-35.

Дегтярьова Л.М. Аналіз структури та використання інформаційної технології обробки даних // Вісник Східноукраїнського нац. університету ім. В. Даля. – Луганськ, СНУ ім. В. Даля, 2013. – №6 (195), ч. 1. – С. 18-20.

Amin Salih M., Yuvaraj D., Sivaram M., Porkodi V. Detection And Removal Of Black Hole Attack In Mobile Ad Hoc Networks Using Grp Protocol. International Journal of Advanced Research in Computer Science. Vol. 9, No 6. P. 1–6, DOI: http://dx.doi.org/10.26483/ijarcs.v9i6.6335

Porkodi V., Sivaram M., Mohammed A.S., Manikandan V. Survey on White-Box Attacks and Solutions. Asian Journal of Computer Science and Technology. Vol. 7, Is. 3. pp. 28–32.

Manikandan V, Porkodi V, Mohammed AS, Sivaram M, “Privacy Preserving Data Mining Using Threshold Based Fuzzy cmeans Clustering”, ICTACT Journal on Soft Computing, Volume 9, Issue 1, 2018, pp.1813-1816. DOI: 10.21917/ijsc.2018.0252

Комплексные системы защиты информации предприятия: учебное пособие / В.Т. Еременко, М.Ю. Рытов, О.М. Голембиовская, П.Н. Рязанцев. – Орел: ФГБОУ ВО «Орловский государственный университет имени И.С. Тургенева», 2016. – 116 с.

Published

2019-04-11