Trudy SPIIRAN
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Informatics and Automation:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Trudy SPIIRAN, 2019, Issue 18, volume 6, Pages 1301–1332
DOI: https://doi.org/10.15622/sp.2019.18.6.1301-1332
(Mi trspy1082)
 

This article is cited in 1 scientific paper (total in 1 paper)

Information Security

Methods of estimating reliability of information security systems which protect from unauthorized access in automated systems

O. I. Bokovaa, I. G. Drovnikovaa, A. S. Etepneva, E. A. Rogozina, V. A. Khvostovb

a Voronezh Institute of the Ministry of Interior
b Voronezh State University of Engineering Technologies
Abstract: Modern methods of protecting information  from unauthorized access in automated systems are based on the use of specialized information security systems from unauthorized access. Security systems are necessarily included in the form of additional software systems in the software as in a secure execution. Information security systems from unauthorized access can be developed not only in a process of automated systems design, but also complement the system-wide software of functioning systems. The use of the information security systems from unauthorized access can reduce a overall reliability of the automated systems, if they contain errors that are not detected during debugging. The reliability of the information security systems affects effectiveness of information security (confidentiality, integrity and availability). Guidelines of the Federal Service for Technical and Export Control (FSTEC) of Russia are a methodological basis for the formation of the information security systems’ image both in the process of development and in the process of modernization of the automated systems. The guidance documents of FSTEC of Russia do not contain methodological approaches to assessing the reliability of these program systems. In this regard, the actual design of techniques of estimating reliability of the information security systems from unauthorized access in automated systems in a secure execution. The structural complexity of the information security systems from unauthorized access and large number of functions performed necessitates the use of three reliability indicators that characterize the system in solving problems of confidentiality, integrity and availability of information. To develop the technique, the known methods of evaluating the reliability of complex systems are used, which do not allow their decomposition into serial and parallel connection. The developed methods were tested in assessing the reliability of the information security systems from unauthorized access with typical indicators of initial characteristics. The results of calculations and prospects of using the developed methods are presented in the paper.
Keywords: information security system, unauthorized access, automated system, reliability, refusal, information confidentiality, information integrity, information availability.
Received: 13.06.2019
Document Type: Article
UDC: 004.056.53
Language: Russian
Citation: O. I. Bokova, I. G. Drovnikova, A. S. Etepnev, E. A. Rogozin, V. A. Khvostov, “Methods of estimating reliability of information security systems which protect from unauthorized access in automated systems”, Tr. SPIIRAN, 18:6 (2019), 1301–1332
Citation in format AMSBIB
\Bibitem{BokDroEte19}
\by O.~I.~Bokova, I.~G.~Drovnikova, A.~S.~Etepnev, E.~A.~Rogozin, V.~A.~Khvostov
\paper Methods of estimating reliability of information security systems which protect from unauthorized access in automated systems
\jour Tr. SPIIRAN
\yr 2019
\vol 18
\issue 6
\pages 1301--1332
\mathnet{http://mi.mathnet.ru/trspy1082}
\crossref{https://doi.org/10.15622/sp.2019.18.6.1301-1332}
Linking options:
  • https://www.mathnet.ru/eng/trspy1082
  • https://www.mathnet.ru/eng/trspy/v18/i6/p1301
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Informatics and Automation
    Statistics & downloads:
    Abstract page:181
    Full-text PDF :43
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024