Model of current threats to security of confiden-tial data in divisional information systems ; Модель определения актуальных угроз безопасности конфиденциальных данных в распределенной информационной системе ; Модель визначення актуальних загроз безпеки конфіденційних даних в розподіленій інформаційній системі

Saved in:
Bibliographic Details
Title: Model of current threats to security of confiden-tial data in divisional information systems ; Модель определения актуальных угроз безопасности конфиденциальных данных в распределенной информационной системе ; Модель визначення актуальних загроз безпеки конфіденційних даних в розподіленій інформаційній системі
Authors: Лєнков, Сергій, Джулій, Володимир, Муляр, Ігор, Димбовський, Максим
Source: Pidvodni tehnologii; No. 13 (2023); 45-59 ; "Подводные технологии: промышленная и гражданская инженерия"; № 13 (2023); 45-59 ; Pidvodni tehnologii; № 13 (2023); 45-59 ; 2415-8569 ; 2415-8550 ; 10.32347/uwt.2023.13
Publisher Information: Kyiv National University of Construction and Architecture
Publication Year: 2024
Collection: Scientific Periodicals of Ukraine (Ukrainian Research and Academic Network) / Наукова періодика України
Subject Terms: модель, інформаційна безпека, розподілені інформаційні системи, вразливості, атаки, конфіденційні дані, информационная безопасность, распределенные информационные системы, уязвимости, конфиденциальные данные, model, information security, distributed information systems, vulnerabilities, attacks, confidential data
Description: The paper proposes a model for determining actual threats to the information security of distributed information systems, based on algorithms of fuzzy inference and the theory of fuzzy neural systems, unlike known ones, uses sufficient and necessary indicators, excludes expert errors, increases the detection of the number of actual threats to information security of distributed systems by 5 %, reduces the cost of purchasing information protection equipment from 15 to 30%. It takes into account the following factors: the IT infrastructure of the distributed information system, the capabilities of attackers and their level of motivation in the distributed information system, the list of existing protection tools in the distributed information system. The proposed approach differs from existing ones in the following: lack of involvement of highly qualified specialists in the field of information security; the process is automated, has a low computational complexity; absence of deficiencies in expert assessments; allows you to determine the list of current information security threats in information systems of various classes and types. The task of ensuring the security of confidential information becomes the most urgent, which is due to the growth of computer attacks and leaks of information, which are reflected in the statistical data on the commission of crimes in the field of high technologies, the growth of criminal activity using modern communication devices and the Internet. Existing methods of modeling current threats to information security and assessing the effectiveness of the information protection system cannot be used at all stages of the life cycle of distributed information systems - they do not take into account the following indicators in the complex: IT infrastructure of distributed information systems, current threats to information security, security requirements for confidential information, a list of means of protecting confidential information and their value as important indicators when ...
Document Type: article in journal/newspaper
File Description: application/pdf
Language: Ukrainian
Relation: http://uwtech.knuba.edu.ua/article/view/298881/291455; http://uwtech.knuba.edu.ua/article/view/298881
Availability: http://uwtech.knuba.edu.ua/article/view/298881
Rights: Авторське право (c) 2023 Volodymyr Dzhuliy, Ihor Muliar, Maksym Dymbovsky ; https://creativecommons.org/licenses/by/4.0/
Accession Number: edsbas.49FEF441
Database: BASE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: http://uwtech.knuba.edu.ua/article/view/298881#
    Name: EDS - BASE (s4221598)
    Category: fullText
    Text: View record from BASE
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=%D0%9B%D1%94%D0%BD%D0%BA%D0%BE%D0%B2%20%D0%A1
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsbas
DbLabel: BASE
An: edsbas.49FEF441
RelevancyScore: 969
AccessLevel: 3
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 968.605590820313
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Model of current threats to security of confiden-tial data in divisional information systems ; Модель определения актуальных угроз безопасности конфиденциальных данных в распределенной информационной системе ; Модель визначення актуальних загроз безпеки конфіденційних даних в розподіленій інформаційній системі
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Лєнков%2C+Сергій%22">Лєнков, Сергій</searchLink><br /><searchLink fieldCode="AR" term="%22Джулій%2C+Володимир%22">Джулій, Володимир</searchLink><br /><searchLink fieldCode="AR" term="%22Муляр%2C+Ігор%22">Муляр, Ігор</searchLink><br /><searchLink fieldCode="AR" term="%22Димбовський%2C+Максим%22">Димбовський, Максим</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: Pidvodni tehnologii; No. 13 (2023); 45-59 ; "Подводные технологии: промышленная и гражданская инженерия"; № 13 (2023); 45-59 ; Pidvodni tehnologii; № 13 (2023); 45-59 ; 2415-8569 ; 2415-8550 ; 10.32347/uwt.2023.13
– Name: Publisher
  Label: Publisher Information
  Group: PubInfo
  Data: Kyiv National University of Construction and Architecture
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2024
– Name: Subset
  Label: Collection
  Group: HoldingsInfo
  Data: Scientific Periodicals of Ukraine (Ukrainian Research and Academic Network) / Наукова періодика України
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22модель%22">модель</searchLink><br /><searchLink fieldCode="DE" term="%22інформаційна+безпека%22">інформаційна безпека</searchLink><br /><searchLink fieldCode="DE" term="%22розподілені+інформаційні+системи%22">розподілені інформаційні системи</searchLink><br /><searchLink fieldCode="DE" term="%22вразливості%22">вразливості</searchLink><br /><searchLink fieldCode="DE" term="%22атаки%22">атаки</searchLink><br /><searchLink fieldCode="DE" term="%22конфіденційні+дані%22">конфіденційні дані</searchLink><br /><searchLink fieldCode="DE" term="%22информационная+безопасность%22">информационная безопасность</searchLink><br /><searchLink fieldCode="DE" term="%22распределенные+информационные+системы%22">распределенные информационные системы</searchLink><br /><searchLink fieldCode="DE" term="%22уязвимости%22">уязвимости</searchLink><br /><searchLink fieldCode="DE" term="%22конфиденциальные+данные%22">конфиденциальные данные</searchLink><br /><searchLink fieldCode="DE" term="%22model%22">model</searchLink><br /><searchLink fieldCode="DE" term="%22information+security%22">information security</searchLink><br /><searchLink fieldCode="DE" term="%22distributed+information+systems%22">distributed information systems</searchLink><br /><searchLink fieldCode="DE" term="%22vulnerabilities%22">vulnerabilities</searchLink><br /><searchLink fieldCode="DE" term="%22attacks%22">attacks</searchLink><br /><searchLink fieldCode="DE" term="%22confidential+data%22">confidential data</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: The paper proposes a model for determining actual threats to the information security of distributed information systems, based on algorithms of fuzzy inference and the theory of fuzzy neural systems, unlike known ones, uses sufficient and necessary indicators, excludes expert errors, increases the detection of the number of actual threats to information security of distributed systems by 5 %, reduces the cost of purchasing information protection equipment from 15 to 30%. It takes into account the following factors: the IT infrastructure of the distributed information system, the capabilities of attackers and their level of motivation in the distributed information system, the list of existing protection tools in the distributed information system. The proposed approach differs from existing ones in the following: lack of involvement of highly qualified specialists in the field of information security; the process is automated, has a low computational complexity; absence of deficiencies in expert assessments; allows you to determine the list of current information security threats in information systems of various classes and types. The task of ensuring the security of confidential information becomes the most urgent, which is due to the growth of computer attacks and leaks of information, which are reflected in the statistical data on the commission of crimes in the field of high technologies, the growth of criminal activity using modern communication devices and the Internet. Existing methods of modeling current threats to information security and assessing the effectiveness of the information protection system cannot be used at all stages of the life cycle of distributed information systems - they do not take into account the following indicators in the complex: IT infrastructure of distributed information systems, current threats to information security, security requirements for confidential information, a list of means of protecting confidential information and their value as important indicators when ...
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: article in journal/newspaper
– Name: Format
  Label: File Description
  Group: SrcInfo
  Data: application/pdf
– Name: Language
  Label: Language
  Group: Lang
  Data: Ukrainian
– Name: NoteTitleSource
  Label: Relation
  Group: SrcInfo
  Data: http://uwtech.knuba.edu.ua/article/view/298881/291455; http://uwtech.knuba.edu.ua/article/view/298881
– Name: URL
  Label: Availability
  Group: URL
  Data: http://uwtech.knuba.edu.ua/article/view/298881
– Name: Copyright
  Label: Rights
  Group: Cpyrght
  Data: Авторське право (c) 2023 Volodymyr Dzhuliy, Ihor Muliar, Maksym Dymbovsky ; https://creativecommons.org/licenses/by/4.0/
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsbas.49FEF441
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.49FEF441
RecordInfo BibRecord:
  BibEntity:
    Languages:
      – Text: Ukrainian
    Subjects:
      – SubjectFull: модель
        Type: general
      – SubjectFull: інформаційна безпека
        Type: general
      – SubjectFull: розподілені інформаційні системи
        Type: general
      – SubjectFull: вразливості
        Type: general
      – SubjectFull: атаки
        Type: general
      – SubjectFull: конфіденційні дані
        Type: general
      – SubjectFull: информационная безопасность
        Type: general
      – SubjectFull: распределенные информационные системы
        Type: general
      – SubjectFull: уязвимости
        Type: general
      – SubjectFull: конфиденциальные данные
        Type: general
      – SubjectFull: model
        Type: general
      – SubjectFull: information security
        Type: general
      – SubjectFull: distributed information systems
        Type: general
      – SubjectFull: vulnerabilities
        Type: general
      – SubjectFull: attacks
        Type: general
      – SubjectFull: confidential data
        Type: general
    Titles:
      – TitleFull: Model of current threats to security of confiden-tial data in divisional information systems ; Модель определения актуальных угроз безопасности конфиденциальных данных в распределенной информационной системе ; Модель визначення актуальних загроз безпеки конфіденційних даних в розподіленій інформаційній системі
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Лєнков, Сергій
      – PersonEntity:
          Name:
            NameFull: Джулій, Володимир
      – PersonEntity:
          Name:
            NameFull: Муляр, Ігор
      – PersonEntity:
          Name:
            NameFull: Димбовський, Максим
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Type: published
              Y: 2024
          Identifiers:
            – Type: issn-locals
              Value: edsbas
            – Type: issn-locals
              Value: edsbas.oa
          Titles:
            – TitleFull: Pidvodni tehnologii; No. 13 (2023); 45-59 ; "Подводные технологии: промышленная и гражданская инженерия"; № 13 (2023); 45-59 ; Pidvodni tehnologii; № 13 (2023); 45-59 ; 2415-8569 ; 2415-8550 ; 10.32347/uwt.2023.13
              Type: main
ResultId 1