350 rub
Journal Highly available systems №3 for 2016 г.
Article in number:
Information security of the Optical and Radar Information Storage for the Arctic zone («ORISAZ»)
Authors:
V.I. Budzko - Dr. Sc. (Eng.), Corresponding Member of Academy of Cryptography of RF, Deputy Director of R&D, FRC «Computer Science and Control» RAS (Moscow) E-mail: vbudzko@ipiran.ru V.G. Belenkov - Ph. D. (Eng.), Leading Research Scientist, FRC «Computer Science and Control» RAS (Moscow) E-mail: vbelenkov@ipiran.ru S.V. Borokhov - Senior Research Scientist, FRC «Computer Science and Control» RAS (Moscow) E-mail: sborokhov@ipiran.ru P.A. Keyer - Senior Research Scientist, FRC «Computer Science and Control» RAS (Moscow) E-mail: pkeyer@ipiran.ru N.N. Smetanin - Ph. D. (Eng.), General Director of JSC «Pallada» (Moscow) E-mail: snn@geopallada.ru
Abstract:
The article in general describes an approach to solving common tasks of ORISAZ information security, taking into account the integration of information with different confidentiality/secrecy degree, coming from various kinds of sources, with high diversity of the IS requirements in the source systems related to the different objects of the search/surveillance and areas of search/ surveillance of the Arctic zone. Security priorities for the types of information processed and stored in ORISAZ are set, based on the pattern of this information types using in search and rescue operations (SRO/ASR)/activities/projects. Main problems of ORISAZ information security are defined. Main ways to address these problems are suggested. The list and descriptions of the common tasks of ORISAZ information security are given. The general approach and methods for per-forming these tasks are defined.
Pages: 58-72
References

 

  1. Budzko V.I., Belenkov V.G., Smetanin N.N., Ulitenkov M.V. KHranilishhe opticheskojj i radiolokacionnojj informacii po arkticheskojj zone («KHORIAZ») // Sistemy vysokojj dostupnosti. 2015. T. 11. № 4. S. 3−15.
  2. GOST R ISO/MEHK 15408 «Informacionnaja tekhnologija. Metody i sredstva obespechenija bezopasnosti. Kriterii ocenki bezopasnosti informacionnykh tekhnologijj».
  3. GOST R ISO/MEHK 13335-1-2006 Informacionnaja tekhnologija. Metody i sredstva obespechenija bezopasnosti. CHast 1. Koncepcija i modeli menedzhmenta bezopasnosti informacionnykh i telekommunikacionnykh tekhnologijj.
  4. Flight tracking service Flightradar24. URL = http://www.flightradar24.com/.
  5. Budzko V.I., Brjukhov D.O., Devjatkin D.A., Skvorcov N.A., Smetanin N.N., Stupnikov S.A., SHelmanov A.O. Problemy izvlechenija informacii iz raznostrukturirovannykh dannykh dlja reshenija zadach informacionnojj podderzhki poiskovykh dejjstvijj v arkticheskojj zone // Trudy Mezhdunar. nauchno-tekhnich. konf. «Informacionnye tekhnologii i matematicheskoe modelirovanie sistem 2015». M.: Centr informacionnykh tekhnologijj v proektirovanii RAN. 2015. S. 121−127.
  6. GOST R ISO/MEHK 27001-2006 «Informacionnaja tekhnologija. Metody i sredstva obespechenija bezopasnosti. Sistemy menedzhmenta informacionnojj bezopasnosti. Trebovanija».
  7. Prikaz FSTEHK Rossii 11.02.2013 № 17 «Ob utverzhdenii Trebovanijj o zashhite informacii, ne sostavljajushhejj gosudarstvennuju tajjnu, soderzhashhejjsja v gosudarstvennykh informacionnykh sistemakh».
  8. Federalnyjj zakon «Ob ehlektronnojj podpisi» ot 06.04.2011 № 63-FZ.
  9. Apache Hadoop 2.7.1. URL = http://hadoop.apache.org/docs/r2.7.1/.
  10. InfoSphere BigInsights security. URL = http://www-01.ibm.com/support/knowledgecenter/SSPT3X_2.1.1/com.ibm.swg. im.infosphere.biginsights.admin.doc/doc/c0057888.html.
  11. Setting up security for InfoSphere Streams. URL = http://www-01.ibm.com/support/knowledgecenter/SSCRJU_3.2.1/com.ibm.swg. im.infosphere.streams.admin.doc/doc/ibminfospherestreams-user-security.html.
  12. Configuring DB2 Warehouse. URL = http://www-01.ibm.com/support/knowledgecenter/SSEPGG_10.5.0/com.ibm.data­tools.accommon.doc/configuring_apps.html.
  13. IBM InfoSphere Information Server. Version 9.1.0. Managing security. URL = http://www-01.ibm.com/support/knowledgecenter/ SSZJPZ_9.1.0/com.ibm.swg.im.iis.found.admin.nav.doc/containers/cont_iisinfsrv_security.html.
  14. Business Intelligence: Rukovodstvo po administrirovaniju i bezopasnosti 10.2.0. Model bezopasnosti. URL = http://www-01.ibm.com/support/knowledgecenter/SSEP7J_10.2.0/com.ibm.swg.ba.cognos.ug_cra.10.2.0.doc/c_securitymodel.html%23SecurityModel.
  15. PureData System for Analytics 7.0.3. IBM Netezza System Administration. Security and access control. URL = http://www-01.ibm.com/support/knowledgecenter/SSULQD_7.0.3/com.ibm.nz.adm.doc/c_sysadm_security_access_control.html.
  16. Oracle NoSQL Database Security Guide. URL = http://docs.oracle.com/cd/NOSQL/html/SecurityGuide/index.html.
  17. Oracle Big Data Appliance. Software User\'s Guide. Release 4 (4.2). E63062-04. URL = https://docs.oracle.com/cd/E63064_01/ doc.42/e63062.pdf.
  18. Oracle Exadata Database Machine Security Guide. 12c Release 1 (12.1). E50469-04. URL = http://docs.oracle.com/cd/E50790_01/ doc/doc.121/e50469/toc.htm.
  19. Security Features in the Teradata Database. URL =  http://www.teradata.com.ru/Resources/White-Papers/Security-Features-in-the-Teradata-Database.