|
This article is cited in 1 scientific paper (total in 1 paper)
COMPUTER SOFTWARE AND COMPUTING EQUIPMENT
The conceptual scheme of information security in the object protection model
G. A. Popov, A. G. Popov, N. D. Shishkin, M. F. Rudenko Astrakhan State Technical University
Abstract:
This paper proposes a conceptual scheme of information security (IS) which comprises most existing IS systems. There are shown seven components describing IS process in the object protection model: requirements to IS support; the data protected; threats to the protected data; countermeasures to the threats; information system for the protected data processing; conditions facilitating or impeding IS process; object of protection. The diagram showing interrelations of the listed components has been given. The meanings of the entities "requirements", "Information system", "conditions", "object of protection" have been clarified; mechanisms for influencing IS process of such entities as "information system", "conditions", "object of protection" have been revealed. For the entity "requirements" there have been allocated seven classes of requirements to ensure information security; the main legislative and normative documents that define the content
of these requirements for each class of requirements have been given. The approaches to measurability and assessment of the rate of requirements implementation have been described. It is stated that a number of elements in a wealth of elementary requirements are rather high, therefore, instead of the list of elementary requirements there are usually developed several generalized factors (probabilistic factor, time factor, expenses factor). IS systems oriented to these factors help to realize a more flexible IS technique, when cases of IS violation not leading to a substantial damage could be even neglected, and IS system will mainly focus on preventing most dangerous attempts to break IS.
Keywords:
providing information security; conceptual scheme; entities of IS process; IS requirements, attendant requirements.
Received: 11.09.2017
Citation:
G. A. Popov, A. G. Popov, N. D. Shishkin, M. F. Rudenko, “The conceptual scheme of information security in the object protection model”, Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2017, no. 4, 45–53
Linking options:
https://www.mathnet.ru/eng/vagtu505 https://www.mathnet.ru/eng/vagtu/y2017/i4/p45
|
Statistics & downloads: |
Abstract page: | 93 | Full-text PDF : | 59 | References: | 25 |
|