Model of current threats to security of confiden-tial data in divisional information systems ; Модель определения актуальных угроз безопасности конфиденциальных данных в распределенной информационной системе ; Модель визначення актуальних загроз безпеки конфіденційних даних в розподіленій інформаційній системі

Saved in:
Bibliographic Details
Title: Model of current threats to security of confiden-tial data in divisional information systems ; Модель определения актуальных угроз безопасности конфиденциальных данных в распределенной информационной системе ; Модель визначення актуальних загроз безпеки конфіденційних даних в розподіленій інформаційній системі
Authors: Лєнков, Сергій, Джулій, Володимир, Муляр, Ігор, Димбовський, Максим
Source: Pidvodni tehnologii; No. 13 (2023); 45-59 ; "Подводные технологии: промышленная и гражданская инженерия"; № 13 (2023); 45-59 ; Pidvodni tehnologii; № 13 (2023); 45-59 ; 2415-8569 ; 2415-8550 ; 10.32347/uwt.2023.13
Publisher Information: Kyiv National University of Construction and Architecture
Publication Year: 2024
Collection: Scientific Periodicals of Ukraine (Ukrainian Research and Academic Network) / Наукова періодика України
Subject Terms: модель, інформаційна безпека, розподілені інформаційні системи, вразливості, атаки, конфіденційні дані, информационная безопасность, распределенные информационные системы, уязвимости, конфиденциальные данные, model, information security, distributed information systems, vulnerabilities, attacks, confidential data
Description: The paper proposes a model for determining actual threats to the information security of distributed information systems, based on algorithms of fuzzy inference and the theory of fuzzy neural systems, unlike known ones, uses sufficient and necessary indicators, excludes expert errors, increases the detection of the number of actual threats to information security of distributed systems by 5 %, reduces the cost of purchasing information protection equipment from 15 to 30%. It takes into account the following factors: the IT infrastructure of the distributed information system, the capabilities of attackers and their level of motivation in the distributed information system, the list of existing protection tools in the distributed information system. The proposed approach differs from existing ones in the following: lack of involvement of highly qualified specialists in the field of information security; the process is automated, has a low computational complexity; absence of deficiencies in expert assessments; allows you to determine the list of current information security threats in information systems of various classes and types. The task of ensuring the security of confidential information becomes the most urgent, which is due to the growth of computer attacks and leaks of information, which are reflected in the statistical data on the commission of crimes in the field of high technologies, the growth of criminal activity using modern communication devices and the Internet. Existing methods of modeling current threats to information security and assessing the effectiveness of the information protection system cannot be used at all stages of the life cycle of distributed information systems - they do not take into account the following indicators in the complex: IT infrastructure of distributed information systems, current threats to information security, security requirements for confidential information, a list of means of protecting confidential information and their value as important indicators when ...
Document Type: article in journal/newspaper
File Description: application/pdf
Language: Ukrainian
Relation: http://uwtech.knuba.edu.ua/article/view/298881/291455; http://uwtech.knuba.edu.ua/article/view/298881
Availability: http://uwtech.knuba.edu.ua/article/view/298881
Rights: Авторське право (c) 2023 Volodymyr Dzhuliy, Ihor Muliar, Maksym Dymbovsky ; https://creativecommons.org/licenses/by/4.0/
Accession Number: edsbas.49FEF441
Database: BASE
Be the first to leave a comment!
You must be logged in first