|
Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics, 2014, Number 2, Pages 28–37
(Mi vagtu311)
|
|
|
|
This article is cited in 2 scientific papers (total in 2 papers)
COMPUTER SOFTWARE AND COMPUTING EQUIPMENT
The procedure of evaluation of indicators of malicious penetration in the structure of the automated monitoring system of physical security of the protected object
S. V. Belov, A. V. Melnikov Astrakhan State Technical University
Abstract:
This paper proposes to present a state of the physical security of an object in the form of an oriented weighted graph that displays the possible routes of malicious intrusion to the protected property values. On the basis of graphical representation the problems of estimating the average expected time to the nearest point of the possible penetration into the protection object and identifying the most vulnerable intruder routes to the protected values are solved. The suggested formalized methods of the analysis of the characteristics that describe the level of security allow more objectively and accurately assess the state of security at the protected facility. In particular, the algorithm of identification of the most vulnerable links and facilities that can implement effective options to improve the safety of the facility is developed. This algorithm is used as a separate unit within the automated control system security. The assessments of the moments of the most possible increase of malicious activity on the object of protection enable better protection to the object through the application of additional protective equipment at intervals of possible rise in malicious activity.
Keywords:
physical security; object protection; penetration time; route penetration; automated control of the security system.
Received: 14.03.2014
Citation:
S. V. Belov, A. V. Melnikov, “The procedure of evaluation of indicators of malicious penetration in the structure of the automated monitoring system of physical security of the protected object”, Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2014, no. 2, 28–37
Linking options:
https://www.mathnet.ru/eng/vagtu311 https://www.mathnet.ru/eng/vagtu/y2014/i2/p28
|
|