Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities
Aim. One of the key objectives of the theory and practice of information security is to analyse the functioning of protected automated systems, particularly those operated at computerized facilities of internal affairs bodies. In order to identify potential threats to resources of confidential infor...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | Russian |
| Published: |
Dagestan State Technical University
2020-08-01
|
| Series: | Вестник Дагестанского государственного технического университета: Технические науки |
| Subjects: | |
| Online Access: | https://vestnik.dgtu.ru/jour/article/view/807 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849410187632312320 |
|---|---|
| author | Yu. M. Barkalov I. G. Drovnikova A. M. Kadnova E. S. Ovchinnikova E. A. Rogozin |
| author_facet | Yu. M. Barkalov I. G. Drovnikova A. M. Kadnova E. S. Ovchinnikova E. A. Rogozin |
| author_sort | Yu. M. Barkalov |
| collection | DOAJ |
| description | Aim. One of the key objectives of the theory and practice of information security is to analyse the functioning of protected automated systems, particularly those operated at computerized facilities of internal affairs bodies. In order to identify potential threats to resources of confidential information, to assess the risk of threat implementation, as well as to form a list of potential threats to automated systems installed at computerized facilities of internal affairs bodies, it is necessary to analyse the composition and architecture of automated systems, identify the features of their protected functioning and determine the vulnerability of software and hardware systems. Methods. A comprehensive analysis of the functioning of protected automated systems during their operation at computerized facilities of internal affairs bodies was conducted. Results. Following an analysis of normative documentation and research publications in the field of protecting information in automated systems, departmental records of the Ministry of Internal Affairs of the Russian Federation, regulations for the protection of information at computerized facilities of internal affairs bodies, the structure and architecture of a protected automated system were defined. Potential threats to the functioning of such a system, including cyber attacks, were identified. On the basis of a survey among experts in the field of information security, the vulnerability (in term of cyber attacks) of the software components of an automated system installed at computerized facilities of internal affairs bodies was analysed. Conclusion. The results can be used in the process of designing and operating information security tools and systems installed at computerized facilities of internal affairs bodies for the purpose of improving their security. |
| format | Article |
| id | doaj-art-9c957beffe4649ddafda723b4c32ad75 |
| institution | Kabale University |
| issn | 2073-6185 2542-095X |
| language | Russian |
| publishDate | 2020-08-01 |
| publisher | Dagestan State Technical University |
| record_format | Article |
| series | Вестник Дагестанского государственного технического университета: Технические науки |
| spelling | doaj-art-9c957beffe4649ddafda723b4c32ad752025-08-20T03:35:12ZrusDagestan State Technical UniversityВестник Дагестанского государственного технического университета: Технические науки2073-61852542-095X2020-08-01472405110.21822/2073-6185-2020-47-2-40-51578Analysis of the architecture and functions of protected automated systems installed at internal affairs facilitiesYu. M. Barkalov0I. G. Drovnikova1A. M. Kadnova2E. S. Ovchinnikova3E. A. Rogozin4Voronezh Institute of the Ministry of Internal Affairs of RussiaVoronezh Institute of the Ministry of Internal Affairs of RussiaVoronezh Institute of the Ministry of Internal Affairs of RussiaVoronezh Institute of the Ministry of Internal Affairs of RussiaVoronezh Institute of the Ministry of Internal Affairs of RussiaAim. One of the key objectives of the theory and practice of information security is to analyse the functioning of protected automated systems, particularly those operated at computerized facilities of internal affairs bodies. In order to identify potential threats to resources of confidential information, to assess the risk of threat implementation, as well as to form a list of potential threats to automated systems installed at computerized facilities of internal affairs bodies, it is necessary to analyse the composition and architecture of automated systems, identify the features of their protected functioning and determine the vulnerability of software and hardware systems. Methods. A comprehensive analysis of the functioning of protected automated systems during their operation at computerized facilities of internal affairs bodies was conducted. Results. Following an analysis of normative documentation and research publications in the field of protecting information in automated systems, departmental records of the Ministry of Internal Affairs of the Russian Federation, regulations for the protection of information at computerized facilities of internal affairs bodies, the structure and architecture of a protected automated system were defined. Potential threats to the functioning of such a system, including cyber attacks, were identified. On the basis of a survey among experts in the field of information security, the vulnerability (in term of cyber attacks) of the software components of an automated system installed at computerized facilities of internal affairs bodies was analysed. Conclusion. The results can be used in the process of designing and operating information security tools and systems installed at computerized facilities of internal affairs bodies for the purpose of improving their security.https://vestnik.dgtu.ru/jour/article/view/807automated systemvulnerabilitythreatunauthorized accesscyber attackinformation protection |
| spellingShingle | Yu. M. Barkalov I. G. Drovnikova A. M. Kadnova E. S. Ovchinnikova E. A. Rogozin Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities Вестник Дагестанского государственного технического университета: Технические науки automated system vulnerability threat unauthorized access cyber attack information protection |
| title | Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities |
| title_full | Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities |
| title_fullStr | Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities |
| title_full_unstemmed | Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities |
| title_short | Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities |
| title_sort | analysis of the architecture and functions of protected automated systems installed at internal affairs facilities |
| topic | automated system vulnerability threat unauthorized access cyber attack information protection |
| url | https://vestnik.dgtu.ru/jour/article/view/807 |
| work_keys_str_mv | AT yumbarkalov analysisofthearchitectureandfunctionsofprotectedautomatedsystemsinstalledatinternalaffairsfacilities AT igdrovnikova analysisofthearchitectureandfunctionsofprotectedautomatedsystemsinstalledatinternalaffairsfacilities AT amkadnova analysisofthearchitectureandfunctionsofprotectedautomatedsystemsinstalledatinternalaffairsfacilities AT esovchinnikova analysisofthearchitectureandfunctionsofprotectedautomatedsystemsinstalledatinternalaffairsfacilities AT earogozin analysisofthearchitectureandfunctionsofprotectedautomatedsystemsinstalledatinternalaffairsfacilities |