Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities

Aim. One of the key objectives of the theory and practice of information security is to analyse the functioning of protected automated systems, particularly those operated at computerized facilities of internal affairs bodies. In order to identify potential threats to resources of confidential infor...

Full description

Saved in:
Bibliographic Details
Main Authors: Yu. M. Barkalov, I. G. Drovnikova, A. M. Kadnova, E. S. Ovchinnikova, E. A. Rogozin
Format: Article
Language:Russian
Published: Dagestan State Technical University 2020-08-01
Series:Вестник Дагестанского государственного технического университета: Технические науки
Subjects:
Online Access:https://vestnik.dgtu.ru/jour/article/view/807
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849410187632312320
author Yu. M. Barkalov
I. G. Drovnikova
A. M. Kadnova
E. S. Ovchinnikova
E. A. Rogozin
author_facet Yu. M. Barkalov
I. G. Drovnikova
A. M. Kadnova
E. S. Ovchinnikova
E. A. Rogozin
author_sort Yu. M. Barkalov
collection DOAJ
description Aim. One of the key objectives of the theory and practice of information security is to analyse the functioning of protected automated systems, particularly those operated at computerized facilities of internal affairs bodies. In order to identify potential threats to resources of confidential information, to assess the risk of threat implementation, as well as to form a list of potential threats to automated systems installed at computerized facilities of internal affairs bodies, it is necessary to analyse the composition and architecture of automated systems, identify the features of their protected functioning and determine the vulnerability of software and hardware systems. Methods. A comprehensive analysis of the functioning of protected automated systems during their operation at computerized facilities of internal affairs bodies was conducted. Results. Following an analysis of normative documentation and research publications in the field of protecting information in automated systems, departmental records of the Ministry of Internal Affairs of the Russian Federation, regulations for the protection of information at computerized facilities of internal affairs bodies, the structure and architecture of a protected automated system were defined. Potential threats to the functioning of such a system, including cyber attacks, were identified. On the basis of a survey among experts in the field of information security, the vulnerability (in term of cyber attacks) of the software components of an automated system installed at computerized facilities of internal affairs bodies was analysed. Conclusion. The results can be used in the process of designing and operating information security tools and systems installed at computerized facilities of internal affairs bodies for the purpose of improving their security.
format Article
id doaj-art-9c957beffe4649ddafda723b4c32ad75
institution Kabale University
issn 2073-6185
2542-095X
language Russian
publishDate 2020-08-01
publisher Dagestan State Technical University
record_format Article
series Вестник Дагестанского государственного технического университета: Технические науки
spelling doaj-art-9c957beffe4649ddafda723b4c32ad752025-08-20T03:35:12ZrusDagestan State Technical UniversityВестник Дагестанского государственного технического университета: Технические науки2073-61852542-095X2020-08-01472405110.21822/2073-6185-2020-47-2-40-51578Analysis of the architecture and functions of protected automated systems installed at internal affairs facilitiesYu. M. Barkalov0I. G. Drovnikova1A. M. Kadnova2E. S. Ovchinnikova3E. A. Rogozin4Voronezh Institute of the Ministry of Internal Affairs of RussiaVoronezh Institute of the Ministry of Internal Affairs of RussiaVoronezh Institute of the Ministry of Internal Affairs of RussiaVoronezh Institute of the Ministry of Internal Affairs of RussiaVoronezh Institute of the Ministry of Internal Affairs of RussiaAim. One of the key objectives of the theory and practice of information security is to analyse the functioning of protected automated systems, particularly those operated at computerized facilities of internal affairs bodies. In order to identify potential threats to resources of confidential information, to assess the risk of threat implementation, as well as to form a list of potential threats to automated systems installed at computerized facilities of internal affairs bodies, it is necessary to analyse the composition and architecture of automated systems, identify the features of their protected functioning and determine the vulnerability of software and hardware systems. Methods. A comprehensive analysis of the functioning of protected automated systems during their operation at computerized facilities of internal affairs bodies was conducted. Results. Following an analysis of normative documentation and research publications in the field of protecting information in automated systems, departmental records of the Ministry of Internal Affairs of the Russian Federation, regulations for the protection of information at computerized facilities of internal affairs bodies, the structure and architecture of a protected automated system were defined. Potential threats to the functioning of such a system, including cyber attacks, were identified. On the basis of a survey among experts in the field of information security, the vulnerability (in term of cyber attacks) of the software components of an automated system installed at computerized facilities of internal affairs bodies was analysed. Conclusion. The results can be used in the process of designing and operating information security tools and systems installed at computerized facilities of internal affairs bodies for the purpose of improving their security.https://vestnik.dgtu.ru/jour/article/view/807automated systemvulnerabilitythreatunauthorized accesscyber attackinformation protection
spellingShingle Yu. M. Barkalov
I. G. Drovnikova
A. M. Kadnova
E. S. Ovchinnikova
E. A. Rogozin
Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities
Вестник Дагестанского государственного технического университета: Технические науки
automated system
vulnerability
threat
unauthorized access
cyber attack
information protection
title Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities
title_full Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities
title_fullStr Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities
title_full_unstemmed Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities
title_short Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities
title_sort analysis of the architecture and functions of protected automated systems installed at internal affairs facilities
topic automated system
vulnerability
threat
unauthorized access
cyber attack
information protection
url https://vestnik.dgtu.ru/jour/article/view/807
work_keys_str_mv AT yumbarkalov analysisofthearchitectureandfunctionsofprotectedautomatedsystemsinstalledatinternalaffairsfacilities
AT igdrovnikova analysisofthearchitectureandfunctionsofprotectedautomatedsystemsinstalledatinternalaffairsfacilities
AT amkadnova analysisofthearchitectureandfunctionsofprotectedautomatedsystemsinstalledatinternalaffairsfacilities
AT esovchinnikova analysisofthearchitectureandfunctionsofprotectedautomatedsystemsinstalledatinternalaffairsfacilities
AT earogozin analysisofthearchitectureandfunctionsofprotectedautomatedsystemsinstalledatinternalaffairsfacilities