Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics, 2010, Number 2, Pages 149–152 (Mi vagtu196)  

COMPUTER SOFTWARE AND COMPUTING EQUIPMENT

Analysis of modern threats to information security occurring while the network interaction

G. V. Babenko

Astrakhan State Technical University
References:
Abstract: The classification of information security threats from networking was based on the general scheme of networking, networks location, network infrastructure components relative to potential offenders. Furthermore, three classes of vulnerable parts of the system (software, hardware, man-made) were identified for convenience. The structuring method of objectives and functions was used for the analysis. According to it, the set of vulnerable sections and security threats is represented as a system of six levels, where the upper components — goals, and the bottom ones — functions, except for the level of the life cycle. The result is a system, where each vulnerable part can be compared with the list of threats to information security.
Keywords: vulnerability, network interaction, threats to information security, structuring of objectives and functions, operation system, network infrastructure, means of information security, privacy, availability, integrity.
Received: 12.03.2010
Document Type: Article
UDC: 004.7.056
Language: Russian
Citation: G. V. Babenko, “Analysis of modern threats to information security occurring while the network interaction”, Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2010, no. 2, 149–152
Citation in format AMSBIB
\Bibitem{Bab10}
\by G.~V.~Babenko
\paper Analysis of modern threats to information security occurring while the network interaction
\jour Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics
\yr 2010
\issue 2
\pages 149--152
\mathnet{http://mi.mathnet.ru/vagtu196}
Linking options:
  • https://www.mathnet.ru/eng/vagtu196
  • https://www.mathnet.ru/eng/vagtu/y2010/i2/p149
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Вестник Астраханского государственного технического университета. Серия: Управление, вычислительная техника и информатика
    Statistics & downloads:
    Abstract page:238
    Full-text PDF :118
    References:31
    First page:1
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024