The method of assessing the effectiveness of the security of confidential data of the distributed information system ; Метод оцінки ефективності безпеки конфіденційних даних розподіленої інформаційної системи
Uloženo v:
| Název: | The method of assessing the effectiveness of the security of confidential data of the distributed information system ; Метод оцінки ефективності безпеки конфіденційних даних розподіленої інформаційної системи |
|---|---|
| Autoři: | Лєнков, Сергій, Джулій, Володимир, Муляр, Ігор |
| Zdroj: | Pidvodni tehnologii; Vol. 1 No. 14 (2024): SMART TECHNOLOGIES 1(14); 18-34 ; "Подводные технологии: промышленная и гражданская инженерия"; Том 1 № 14 (2024): SMART TECHNOLOGIES 1(14); 18-34 ; Pidvodni tehnologii; Том 1 № 14 (2024): SMART TECHNOLOGIES 1(14); 18-34 ; 2415-8569 ; 2415-8550 ; 10.32347/uwt.2024.14 |
| Informace o vydavateli: | Kyiv National University of Construction and Architecture |
| Rok vydání: | 2024 |
| Témata: | метод, інформаційна безпека, розподілені інформаційні системи, вразливості, атаки, конфіденційні дані, method, information security, distributed information systems, vulnerabilities, attacks, confidential data |
| Popis: | The paper proposes a method of assessing the effectiveness of the security of confidential data of a distributed information system, based on a model for determining the current threats to the security of confidential data in the information system, on algorithms of fuzzy inference and the theory of fuzzy neural systems, unlike known ones, it uses sufficient and necessary indicators, excludes expert errors , increases the detection of actual threats to the security of confidential information system data by 5%, reduces the cost of purchasing information protection tools from 15 to 30%. It takes into account the following factors: the IT infrastructure of the distributed information system, the capabilities of attackers and their level of motivation in the information system. The proposed approach differs from existing ones by an automated process, the need to involve highly qualified specialists in the field of information security, and low computational complexity; absence of deficiencies in expert assessments; allows you to determine the list of current information security threats in information systems of various classes and types. The task of ensuring the security of confidential data is urgent, which is due to the growth of computer attacks and leaks of information, which are reflected in the statistical data on the commission of crimes in the field of high technologies, the growth of criminal activity using modern communication devices and the Internet. The existing methods of identifying current threats to information security and assessing the effectiveness of the security of confidential data cannot be used at all stages of the life cycle of distributed information systems, they do not take into account the following indicators in the complex: IT infrastructure of distributed systems, current threats to information security, security requirements of confidential data, their cost as important indicators when solving these problems. One of the most important tasks of ensuring the security of confidential ... |
| Druh dokumentu: | article in journal/newspaper |
| Popis souboru: | application/pdf |
| Jazyk: | Ukrainian |
| Relation: | http://uwtech.knuba.edu.ua/article/view/307215/298545; http://uwtech.knuba.edu.ua/article/view/307215 |
| DOI: | 10.32347/uwt.2024.14.1201 |
| Dostupnost: | http://uwtech.knuba.edu.ua/article/view/307215 https://doi.org/10.32347/uwt.2024.14.1201 |
| Rights: | Авторське право (c) 2024 Serhii Lienkov, Volodymyr Dzhuliy, Ihor Muliar ; https://creativecommons.org/licenses/by/4.0/ |
| Přístupové číslo: | edsbas.1963728 |
| Databáze: | BASE |
| Abstrakt: | The paper proposes a method of assessing the effectiveness of the security of confidential data of a distributed information system, based on a model for determining the current threats to the security of confidential data in the information system, on algorithms of fuzzy inference and the theory of fuzzy neural systems, unlike known ones, it uses sufficient and necessary indicators, excludes expert errors , increases the detection of actual threats to the security of confidential information system data by 5%, reduces the cost of purchasing information protection tools from 15 to 30%. It takes into account the following factors: the IT infrastructure of the distributed information system, the capabilities of attackers and their level of motivation in the information system. The proposed approach differs from existing ones by an automated process, the need to involve highly qualified specialists in the field of information security, and low computational complexity; absence of deficiencies in expert assessments; allows you to determine the list of current information security threats in information systems of various classes and types. The task of ensuring the security of confidential data is urgent, which is due to the growth of computer attacks and leaks of information, which are reflected in the statistical data on the commission of crimes in the field of high technologies, the growth of criminal activity using modern communication devices and the Internet. The existing methods of identifying current threats to information security and assessing the effectiveness of the security of confidential data cannot be used at all stages of the life cycle of distributed information systems, they do not take into account the following indicators in the complex: IT infrastructure of distributed systems, current threats to information security, security requirements of confidential data, their cost as important indicators when solving these problems. One of the most important tasks of ensuring the security of confidential ... |
|---|---|
| DOI: | 10.32347/uwt.2024.14.1201 |
Nájsť tento článok vo Web of Science