V.O. Volosenkov1, E.G. Andrianova2, I.R. Son3, M.V. Shiryaev4, D.A. Kryukov5
1,3 JSC “Concern Morinformsystem-Agat” (Moscow, Russia)
2,4,5 RTU MIREA (Moscow, Russia)
The massive introduction and operation of distributed computing systems has led to the emergence of a range of new problems in the field of security of the individual, society and the state. Ensuring the protection of information from unauthorized access in practice occurs under the conditions of accidental exposure to a variety of factors. Currently, various models and methods used to assess the security of information are known. Existing approaches to assessing the security of information in distributed computing systems do not allow us to fully take into account destructive impacts at the level of network interaction. In this regard, the development of a method for assessing the security of information in distributed computing systems is an urgent task. A method for quantifying the security level of distributed computing systems based on calculating the probabilities of access to information resources is given. The application of the proposed method will make it possible to form reasonable requirements for an information security system capable of countering existing or possible threats.
Volosenkov V.O., Andrianova E.G., Son I.R., Shiryaev M.V., Kryukov D.A. The method for assessing the security of information
in distributed computing systems. Nonlinear World. 2022. V. 20. № 1. P. 50-54. DOI: https://doi.org/10.18127/j20700970-202201-05 (In Russian)
- Mel'nikov V.V. Zashhita informacii v komp'juternyh sistemah. M.: Finansy i statistika, Jelektroninform. 1997 (In Russian).
- Domarev V.V. Bezopasnost' informacionnyh tehnologij. Sistemnyj podhod. K.: OOO TID «Diasoft». 2004. 992 s. (In Russian).
- GOST R 50922-96. Zashhita informacii. Osnovnye terminy i opredelenija (In Russian).
- Shheglov A.Ju. Zashhita komp'juternoj informacii ot nesankcionirovannogo dostupa. Nauka i tehnika. SPb: Piter. 2004.
(In Russian).