Отрывок: Figure 3. Set of admissible values for the control parameter of the information security level μ. Summarize the above in the form of a sequential algorithm for managing the information security of the system and in which we will include the following steps: 1) systematic collection, accumulation and processing of data on information attacks on the system, finding a value fλ that should characterize the actual intensity of attacks on the system, while findin...
Полная запись метаданных
Поле DC Значение Язык
dc.contributor.authorTutubalin, P.I.-
dc.contributor.authorKomissarova, E.M.-
dc.contributor.authorArutyunova, N.K.-
dc.date.accessioned2018-05-22 10:08:42-
dc.date.available2018-05-22 10:08:42-
dc.date.issued2018-
dc.identifierDspace\SGAU\20180519\69686ru
dc.identifier.citationTutubalin P.I. Model of analysis of sustainable management of information security of a distributed information system / P.I. Tutubalin, E.M. Komissarova, N.K. Arutyunova // Сборник трудов IV международной конференции и молодежной школы «Информационные технологии и нанотехнологии» (ИТНТ-2018) - Самара: Новая техника, 2018. - С.1546-1555.ru
dc.identifier.urihttp://repo.ssau.ru/handle/Informacionnye-tehnologii-i-nanotehnologii/Model-of-analysis-of-sustainable-management-of-information-security-of-a-distributed-information-system-69686-
dc.description.abstractThe article presents a model of stability analysis of a distributed information system in the sense of sustainable provision of its information security with some means of protection. It is assumed that the information system in question is operating in real time. On the basis of the proposed model, the area of functional security of a distributed information system under the influence of information attacks of the enemy is constructed, while this task is solved from the condition of specified allowed intervals: the probability of ensuring the information security of the system under consideration, as well as the criterion of deterioration of the main indicator of its effectiveness from enemy interference in process of its functioning. In the form of a strict sequence of actions, an algorithm is formulated to implement the proposed model in practice, provided that the information security of a distributed information system is managed reliably.ru
dc.language.isoenru
dc.publisherНовая техникаru
dc.subjectanalysisru
dc.subjectsystem stabilityru
dc.subjectsystem modelru
dc.subjectinformation securityru
dc.subjectdistributed systemru
dc.titleModel of analysis of sustainable management of information security of a distributed information systemru
dc.typeArticleru
dc.textpartFigure 3. Set of admissible values for the control parameter of the information security level μ. Summarize the above in the form of a sequential algorithm for managing the information security of the system and in which we will include the following steps: 1) systematic collection, accumulation and processing of data on information attacks on the system, finding a value fλ that should characterize the actual intensity of attacks on the system, while findin...-
Располагается в коллекциях: Информационные технологии и нанотехнологии

Файлы этого ресурса:
Файл Описание Размер Формат  
paper_208.pdfОсновная статья206.16 kBAdobe PDFПросмотреть/Открыть



Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.