MODELLING OF SECURITY IN SHIP COMPUTER SYSTEMS
Abstract and keywords
Abstract (English):
The efficiency of actions for protection of a computer system depends on a threat implementation method. It is defined by a concrete security measure, a concrete subsystem of safety. Means of protection of an information system interact in a complex. Assessment of potential of protection of information systems - a task relevant. Is implemented by various methods (expert, heuristic, mathematical, statistical, for example, classifications of threats by danger). Mechanisms, configurations of protective measures are considered. Except problems of identification of the structural components which are subject to assessment, formations of a complex of indicators it is necessary to have the generalizing, integrated indicator of level of security of all system. It is necessary to consider that the class of security of a system formally is defined by "the index of risk", for example, the difference of the maximum rating of degree of privacy of the data processed by a system and the minimum rating of admission of users. At the same time at each company is (systems) - the requirements to security: some the insider concerns, others the DDoS-attacks, the third - authentication, etc. Formalization of a task in language of the theory of counts and mathematical logic is carried out. The concrete mathematical model of the attacks of the information systems of group division into a class protected reliably and a class of poorly protected is considered. The model is applicable to problems of protection of ship networks. Also regression, dispersive analysis by a row of years is done.

Keywords:
system, network, threat, protection, vulnerability, mathematical model, cyber threat, analysis of variance
Text
Publication text (PDF): Read Download
References

1. Scheglov K.AT Scheglov A.Yu. Zaschita ot atak na uyazvimosti prilozheniy. Modeli kontrolya dostupa // Voprosy zaschity informacii-2013-vyp.101- №2.-S.36-43.

2. Razgranichenie dostupa k informacii v komp'yuternyh sistemah. URL: http://lib2.znate.ni/docs/index-323588.html?page=8 (data dostupa: 02.12.2018).

3. Cirlov V.JL Osnovy informacionnoy bezopasnosti avtomatizirovannyh sistem. - Rostov-na-Donu: Feniks, 2008. - 173 s. Razdel 1Ekspluataciya vodnogo transporta i transportnye tehnologii

4. Harrison M., Ruzzo W., Ullmaii J. ESIGN: Protection in operating systems, 1976, vol. 19, №8. -pp.461-471. '

5. Devyanin P.N. Modeli bezopasnossh komp'yuternyh sistem: ucheb.posobie dlya stud. vyssh. ucheb. zavedeniy. - M.: Izd. centr «Akademiya», 2005. -144 s.

6. Kaziev V.M., Kazieva B.V., Kaziev K.V. Osnovy pravovoy informatiki i informatizacii pravovyh sistem,- M.: Infra-M. Vuzovskiy uchebnik (2-oe izd.),2017. - 336 s.


Login or Create
* Forgot password?