Ozhiganova M.I., Kalita A.O., Tishchenko Ye.N. Building Adaptive Information Security Systems
BUILDING ADAPTIVE INFORMATION SECURITY SYSTEMS
Marina I. Ozhiganova
Head of the Department “Information Security”,
Sevastopol State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Universitetskaya St., 33, 299001 Sevastopol, Russian Federation
Anastasia O. Kalita
Associate Professor, Department “Information Security”,
Sevastopol State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Universitetskaya St., 33, 299001 Sevastopol, Russian Federation
Yevgeny N. Tishchenko
Head of the Department “Information Security”,
Rostov State University of Economics (RINH)
This email address is being protected from spambots. You need JavaScript enabled to view it.
Bolshaya Sadovaya St., 69, 344002 Rostov-on-Don, Russian Federation
Abstract. Over the past few decades, there has been a tendency to minimize the participation of the human factor in various production and other processes. This process is implemented through the mass introduction of automated systems (as). Human-machine complexes are currently the most common and productive model of activity. At the current stage of technology development, the process of automating human activity is only an intermediate link on the way to eliminating human intervention. This area is most relevant for systems that pose a potential and real threat to human health and life (for example, manufacturing plants) or systems that are threatened by humans (for example, transport systems). The second group includes the sphere of information security. The paper considers the basics of the organization of adaptive information protection systems, their application areas for information protection and methods of building models of adaptive information protection systems in the context of their application for protection against leakage through technical channels. The authors propose a generalized model of the adaptive information protection system against leakage through technical channels.
Key words: adaptive information security systems, adaptive management, information leakage channels, information security, automated systems.
This work is licensed under a Creative Commons Attribution 4.0 International License.