Зангиев Т.Т., Тарасов Е.С., Сотников В.В., Тугушева З.Я., Гунай Ф.Р. Алгоритм оптимального выбора архитектуры комплексной системы защиты информации с учетом специфики объекта и взаимодействия модулей защиты

ABOUT ONE APPROACH TO THE SELECTION OF INFORMATION PROTECTION FACILITIES

Taimuraz Taimurazovich Zangiev

Candidate of Sciences (Engineering),

Associate Professor, Department of Computer Technologies and Information Security,

Kuban State Technological University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Moskovskaya St., 2, 350072 Krasnodar, Russian Federation

Elizar Savvich Tarasov

Candidate of Sciences (Engineering),

Associate Professor, Department of Computer Technologies and Information Security,

Kuban State Technological University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Moskovskaya St., 2, 350072 Krasnodar, Russian Federation

Vladimir Vladimirovich Sotnikov

Student,

Kuban State Technological University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Moskovskaya St., 2, 350072 Krasnodar, Russian Federation

Zalina Yakubovna Tugusheva

Student,

Kuban State Technological University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Moskovskaya St., 2, 350072 Krasnodar, Russian Federation

Fatima Rashidovna Gunay

Student,

Kuban State Technological University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Moskovskaya St., 2, 350072 Krasnodar, Russian Federation

Abstract. Much attention in the sphere of information technology is paid to the aspects of information security, due to the growing damage. As a result of damage increase, there is a quantitative and qualitative growth in the market of software and hardware for information security. At the same time, new alternatives to existing information security tools are being developed, as well as means of protection against new vectors of attacks associated, for example, with the spread of the concept of ‘Internet of things’, big data and cloud technologies. At the same time, the analysis of information security incidents at enterprises that actively use information security tools shows that the use of information security systems does not provide the required level of protection for information objects that remain susceptible to attacks. According to recent studies, the share of corporate systems in the Russian Federation containing critical vulnerabilities associated with incorrect configuration of information security systems makes up more than 80 %. At the same time, the costs of Russian companies to ensure information security are increasing by an average of 30 % per year. The article presents current problems related to the conflicting requirements to the design of complex information security systems (CISS). The authors suggest an approach to selection and configuration of the CISS facilities based on the role model of M. Belbin in the interpretation of the CISS as a command that will allow building an integrated information protection circuit. The cases of manifestation of synergism and emergence, which ensure the effective functioning of the system, have been described.

Key words: role model, synergy, emergence, protection circuit.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Attachments:
Download this file (4_Zangiev i dr.pdf) 4_Zangiev i dr.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/567
550 DownloadsUpdate this file (4_Zangiev i dr.pdf)