Model of current threats to security of confiden-tial data in divisional information systems ; Модель определения актуальных угроз безопасности конфиденциальных данных в распределенной информационной системе ; Модель визначення актуальних загроз безпеки конфіденційних даних в розподіленій інформаційній системі
Saved in:
| Title: | Model of current threats to security of confiden-tial data in divisional information systems ; Модель определения актуальных угроз безопасности конфиденциальных данных в распределенной информационной системе ; Модель визначення актуальних загроз безпеки конфіденційних даних в розподіленій інформаційній системі |
|---|---|
| Authors: | Лєнков, Сергій, Джулій, Володимир, Муляр, Ігор, Димбовський, Максим |
| Source: | Pidvodni tehnologii; No. 13 (2023); 45-59 ; "Подводные технологии: промышленная и гражданская инженерия"; № 13 (2023); 45-59 ; Pidvodni tehnologii; № 13 (2023); 45-59 ; 2415-8569 ; 2415-8550 ; 10.32347/uwt.2023.13 |
| Publisher Information: | Kyiv National University of Construction and Architecture |
| Publication Year: | 2024 |
| Collection: | Scientific Periodicals of Ukraine (Ukrainian Research and Academic Network) / Наукова періодика України |
| Subject Terms: | модель, інформаційна безпека, розподілені інформаційні системи, вразливості, атаки, конфіденційні дані, информационная безопасность, распределенные информационные системы, уязвимости, конфиденциальные данные, model, information security, distributed information systems, vulnerabilities, attacks, confidential data |
| Description: | The paper proposes a model for determining actual threats to the information security of distributed information systems, based on algorithms of fuzzy inference and the theory of fuzzy neural systems, unlike known ones, uses sufficient and necessary indicators, excludes expert errors, increases the detection of the number of actual threats to information security of distributed systems by 5 %, reduces the cost of purchasing information protection equipment from 15 to 30%. It takes into account the following factors: the IT infrastructure of the distributed information system, the capabilities of attackers and their level of motivation in the distributed information system, the list of existing protection tools in the distributed information system. The proposed approach differs from existing ones in the following: lack of involvement of highly qualified specialists in the field of information security; the process is automated, has a low computational complexity; absence of deficiencies in expert assessments; allows you to determine the list of current information security threats in information systems of various classes and types. The task of ensuring the security of confidential information becomes the most urgent, which is due to the growth of computer attacks and leaks of information, which are reflected in the statistical data on the commission of crimes in the field of high technologies, the growth of criminal activity using modern communication devices and the Internet. Existing methods of modeling current threats to information security and assessing the effectiveness of the information protection system cannot be used at all stages of the life cycle of distributed information systems - they do not take into account the following indicators in the complex: IT infrastructure of distributed information systems, current threats to information security, security requirements for confidential information, a list of means of protecting confidential information and their value as important indicators when ... |
| Document Type: | article in journal/newspaper |
| File Description: | application/pdf |
| Language: | Ukrainian |
| Relation: | http://uwtech.knuba.edu.ua/article/view/298881/291455; http://uwtech.knuba.edu.ua/article/view/298881 |
| Availability: | http://uwtech.knuba.edu.ua/article/view/298881 |
| Rights: | Авторське право (c) 2023 Volodymyr Dzhuliy, Ihor Muliar, Maksym Dymbovsky ; https://creativecommons.org/licenses/by/4.0/ |
| Accession Number: | edsbas.49FEF441 |
| Database: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: http://uwtech.knuba.edu.ua/article/view/298881# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=%D0%9B%D1%94%D0%BD%D0%BA%D0%BE%D0%B2%20%D0%A1 Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.49FEF441 RelevancyScore: 969 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 968.605590820313 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Model of current threats to security of confiden-tial data in divisional information systems ; Модель определения актуальных угроз безопасности конфиденциальных данных в распределенной информационной системе ; Модель визначення актуальних загроз безпеки конфіденційних даних в розподіленій інформаційній системі – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Лєнков%2C+Сергій%22">Лєнков, Сергій</searchLink><br /><searchLink fieldCode="AR" term="%22Джулій%2C+Володимир%22">Джулій, Володимир</searchLink><br /><searchLink fieldCode="AR" term="%22Муляр%2C+Ігор%22">Муляр, Ігор</searchLink><br /><searchLink fieldCode="AR" term="%22Димбовський%2C+Максим%22">Димбовський, Максим</searchLink> – Name: TitleSource Label: Source Group: Src Data: Pidvodni tehnologii; No. 13 (2023); 45-59 ; "Подводные технологии: промышленная и гражданская инженерия"; № 13 (2023); 45-59 ; Pidvodni tehnologii; № 13 (2023); 45-59 ; 2415-8569 ; 2415-8550 ; 10.32347/uwt.2023.13 – Name: Publisher Label: Publisher Information Group: PubInfo Data: Kyiv National University of Construction and Architecture – Name: DatePubCY Label: Publication Year Group: Date Data: 2024 – Name: Subset Label: Collection Group: HoldingsInfo Data: Scientific Periodicals of Ukraine (Ukrainian Research and Academic Network) / Наукова періодика України – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22модель%22">модель</searchLink><br /><searchLink fieldCode="DE" term="%22інформаційна+безпека%22">інформаційна безпека</searchLink><br /><searchLink fieldCode="DE" term="%22розподілені+інформаційні+системи%22">розподілені інформаційні системи</searchLink><br /><searchLink fieldCode="DE" term="%22вразливості%22">вразливості</searchLink><br /><searchLink fieldCode="DE" term="%22атаки%22">атаки</searchLink><br /><searchLink fieldCode="DE" term="%22конфіденційні+дані%22">конфіденційні дані</searchLink><br /><searchLink fieldCode="DE" term="%22информационная+безопасность%22">информационная безопасность</searchLink><br /><searchLink fieldCode="DE" term="%22распределенные+информационные+системы%22">распределенные информационные системы</searchLink><br /><searchLink fieldCode="DE" term="%22уязвимости%22">уязвимости</searchLink><br /><searchLink fieldCode="DE" term="%22конфиденциальные+данные%22">конфиденциальные данные</searchLink><br /><searchLink fieldCode="DE" term="%22model%22">model</searchLink><br /><searchLink fieldCode="DE" term="%22information+security%22">information security</searchLink><br /><searchLink fieldCode="DE" term="%22distributed+information+systems%22">distributed information systems</searchLink><br /><searchLink fieldCode="DE" term="%22vulnerabilities%22">vulnerabilities</searchLink><br /><searchLink fieldCode="DE" term="%22attacks%22">attacks</searchLink><br /><searchLink fieldCode="DE" term="%22confidential+data%22">confidential data</searchLink> – Name: Abstract Label: Description Group: Ab Data: The paper proposes a model for determining actual threats to the information security of distributed information systems, based on algorithms of fuzzy inference and the theory of fuzzy neural systems, unlike known ones, uses sufficient and necessary indicators, excludes expert errors, increases the detection of the number of actual threats to information security of distributed systems by 5 %, reduces the cost of purchasing information protection equipment from 15 to 30%. It takes into account the following factors: the IT infrastructure of the distributed information system, the capabilities of attackers and their level of motivation in the distributed information system, the list of existing protection tools in the distributed information system. The proposed approach differs from existing ones in the following: lack of involvement of highly qualified specialists in the field of information security; the process is automated, has a low computational complexity; absence of deficiencies in expert assessments; allows you to determine the list of current information security threats in information systems of various classes and types. The task of ensuring the security of confidential information becomes the most urgent, which is due to the growth of computer attacks and leaks of information, which are reflected in the statistical data on the commission of crimes in the field of high technologies, the growth of criminal activity using modern communication devices and the Internet. Existing methods of modeling current threats to information security and assessing the effectiveness of the information protection system cannot be used at all stages of the life cycle of distributed information systems - they do not take into account the following indicators in the complex: IT infrastructure of distributed information systems, current threats to information security, security requirements for confidential information, a list of means of protecting confidential information and their value as important indicators when ... – Name: TypeDocument Label: Document Type Group: TypDoc Data: article in journal/newspaper – Name: Format Label: File Description Group: SrcInfo Data: application/pdf – Name: Language Label: Language Group: Lang Data: Ukrainian – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: http://uwtech.knuba.edu.ua/article/view/298881/291455; http://uwtech.knuba.edu.ua/article/view/298881 – Name: URL Label: Availability Group: URL Data: http://uwtech.knuba.edu.ua/article/view/298881 – Name: Copyright Label: Rights Group: Cpyrght Data: Авторське право (c) 2023 Volodymyr Dzhuliy, Ihor Muliar, Maksym Dymbovsky ; https://creativecommons.org/licenses/by/4.0/ – Name: AN Label: Accession Number Group: ID Data: edsbas.49FEF441 |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.49FEF441 |
| RecordInfo | BibRecord: BibEntity: Languages: – Text: Ukrainian Subjects: – SubjectFull: модель Type: general – SubjectFull: інформаційна безпека Type: general – SubjectFull: розподілені інформаційні системи Type: general – SubjectFull: вразливості Type: general – SubjectFull: атаки Type: general – SubjectFull: конфіденційні дані Type: general – SubjectFull: информационная безопасность Type: general – SubjectFull: распределенные информационные системы Type: general – SubjectFull: уязвимости Type: general – SubjectFull: конфиденциальные данные Type: general – SubjectFull: model Type: general – SubjectFull: information security Type: general – SubjectFull: distributed information systems Type: general – SubjectFull: vulnerabilities Type: general – SubjectFull: attacks Type: general – SubjectFull: confidential data Type: general Titles: – TitleFull: Model of current threats to security of confiden-tial data in divisional information systems ; Модель определения актуальных угроз безопасности конфиденциальных данных в распределенной информационной системе ; Модель визначення актуальних загроз безпеки конфіденційних даних в розподіленій інформаційній системі Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Лєнков, Сергій – PersonEntity: Name: NameFull: Джулій, Володимир – PersonEntity: Name: NameFull: Муляр, Ігор – PersonEntity: Name: NameFull: Димбовський, Максим IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Type: published Y: 2024 Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa Titles: – TitleFull: Pidvodni tehnologii; No. 13 (2023); 45-59 ; "Подводные технологии: промышленная и гражданская инженерия"; № 13 (2023); 45-59 ; Pidvodni tehnologii; № 13 (2023); 45-59 ; 2415-8569 ; 2415-8550 ; 10.32347/uwt.2023.13 Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science