|
Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics, 2010, Number 2, Pages 149–152
(Mi vagtu196)
|
|
|
|
COMPUTER SOFTWARE AND COMPUTING EQUIPMENT
Analysis of modern threats to information security occurring while the network interaction
G. V. Babenko Astrakhan State Technical University
Abstract:
The classification of information security threats from networking was based on the general scheme of networking, networks location, network infrastructure components relative to potential offenders. Furthermore, three classes of vulnerable parts of the system (software, hardware, man-made) were identified for convenience. The structuring method of objectives and functions was used for the analysis. According to it, the set of vulnerable sections and security threats is represented as a system of six levels, where the upper components — goals, and the bottom ones — functions, except for the level of the life cycle. The result is a system, where each vulnerable part can be compared with the list of threats to information security.
Keywords:
vulnerability, network interaction, threats to information security, structuring of objectives and functions, operation system, network infrastructure, means of information security, privacy, availability, integrity.
Received: 12.03.2010
Citation:
G. V. Babenko, “Analysis of modern threats to information security occurring while the network interaction”, Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2010, no. 2, 149–152
Linking options:
https://www.mathnet.ru/eng/vagtu196 https://www.mathnet.ru/eng/vagtu/y2010/i2/p149
|
Statistics & downloads: |
Abstract page: | 238 | Full-text PDF : | 118 | References: | 31 | First page: | 1 |
|