PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM
Objectives. Analysis of the existing methodology for the formation of requirements for information protection systems (GIS) from unauthorized access (NSD) to automated systems (AS) revealed a number of significant flaws, the main of which is the following: despite the fact that the considered method...
Saved in:
| Main Authors: | I. G. Drovnikova, A. A. Zmeev, E. A. Rogozin |
|---|---|
| Format: | Article |
| Language: | Russian |
| Published: |
Dagestan State Technical University
2019-05-01
|
| Series: | Вестник Дагестанского государственного технического университета: Технические науки |
| Subjects: | |
| Online Access: | https://vestnik.dgtu.ru/jour/article/view/596 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Methodical approach to quantitative assessment of the risks of the implementation of threats unauthorized access to an information resource automated systems of internal affairs bodies
by: T. V. Meshcheryakova, et al.
Published: (2022-11-01) -
Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities
by: Yu. M. Barkalov, et al.
Published: (2020-08-01) -
MODEL OF THE PROCESS OF FUNCTIONING OF THE INFORMATION PROTECTION SYSTEM FROM UNAUTHORIZED ACCESS CREATED IN THE SOFTWARE ENVIRONMENT OF IMITATION MODELING "CPN TOOLS"
by: O. I. Bokova, et al.
Published: (2019-07-01) -
GRAPH MODELS OF THE DYNAMICS OF NETWORK ATTACKS IN AUTOMATED SYSTEMS OF INTERNAL AFFAIRS BODIES
by: E. S. Ovchinnikova
Published: (2021-04-01) -
METHODOLOGY FOR INVESTIGATING THE PROBABILITY-TIME CHARACTERISTICS OF NETWORK ATTACKS IN THE SIMULATION MODELLING SOFTWARE ENVIRONMENT
by: Irina G. Drovnikova, et al.
Published: (2018-03-01)