Babenko A.A., Kozunova S.S. The Model of Information Security Control in State Information Systems

THE MODEL OF INFORMATION SECURITY CONTROL IN STATE INFORMATION SYSTEMS

Aleksey A. Babenko

Candidate of Sciences (Pedagogy), Associate Professor of Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Svetlana S. Kozunova

Postgraduate Student, Department of Computer-Aided Design and Search Design,

Volgograd State Technical University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Lenina, 28, 400005 Volgograd, Russian Federation

Abstract. The control of information protection in state information systems is relevant due to the requirements of the legislation of the Russian Federation, to the value of the information processed in them, to its increasing role in the formation of the modern information society in the Russian Federation, as well as the increasing need for procedures for combining information flows of organizations and enterprises. The article deals with the issues related to the control of information security in state information systems. The analysis of works on this subject reveals a solution to particular problems. Therefore, an integrated formalized approach to solving the problem of protecting information in state information systems, taking into account their specifics, threats and requirements of regulators, is relevant. The information leaks, leakage channels in such systems, as well as threats to information security breaches in state information systems have been analyzed. The most likely threats are cyber-attacks, natural disasters, structural failures and human errors. A formalized model for managing information security in state information systems has been developed, which defines an effective set of protection tools in accordance with the requirements of technical protection measures that can be used to automate the process of monitoring. The formal model aimed at solving the problem of optimizing the used protection mechanisms in relation to the overlapping threats has been proposed. The prospects for the development of this study have been determined.

Key words: state information system, control system, information security, means of protection, optimization methods, matrix of binary relations, information security system, information technologies.

 

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Attachments:
Download this file (3_Babenko, Kozunova.pmd.pdf) 3_Babenko, Kozunova.pmd.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/616
379 DownloadsUpdate this file (3_Babenko, Kozunova.pmd.pdf)