350 rub
Journal Science Intensive Technologies №3 for 2017 г.
Article in number:
Architectural implementation of intellectual support privacy the data networks
Authors:
V.V. Knyazev - Post-graduate Student, expert on the interaction with the structures of the ETC, JSC «Concern «Morinsys-Agat» (Moscow) E-mail: bosfor15@ya.ru
Abstract:
Using the technologies of automatization in modern information leaks preventing tools is limited by technical aspect of informational analysis (such as searching by signatures, partial matches). Application of those in practice shows that attacks against information leaks are, to a large extent, based on the human factor, which explains the prevalence of identified causes of neglect and social engineering. Automated analysis of the circumstances in situations prior to the implementation of the leak is not possible without taking into account the psychological and social characteristics of the behavior of each of the company\'s employees. The structure complexities of the of these factors relations determine the low diffusion of technology and its application techniques. The analysis of information features and telecommunication networks of the military-industrial enterprises, as a part of a personalized multi-situational risk assessment model, allowed us to determine a set of functional and operational requirements for the system of intellectual support to ensure confidentiality, and to the implementation of situational risk assessment model, breach of confidentiality for the implementation of preventive measures to ensure information security.
Pages: 36-40
References

 

  1. Brian M. Bowen, Ramaswamy Devarajan, Salvatore Stolfo Mesuring the Human Factor of Cyber Security // IEEE International Conference «Technologies for Homeland Security» (HST). 2011. P. 230−235.
  2. Snou D. PSYCHO: Socialnyjj inzhener - vsem khakeram primer! Praktikum po socialnojj inzhenerii // KHaker. 2010. № 7. S. 134−139.
  3. Kovalenko A.P., Belov E.B. Koncepcija podgotovki kadrov v oblasti obespechenija informacionnojj bezopasnosti (problemy, analiz, podkhody) // Sb. statejj «Nauchnye i metodologicheskie problemy informacionnojj bezopasnosti» / Pod red. V.P. SHerstjuka. M: MCNMO. 2004. S. 117−131.
  4. Boost C++ Libraries: [sajjt]. URL: http://www.boost.org.
  5. PostgreSQL: The world\'s most advanced open source database: [sajjt]. URL: http://www.postgresql.org.
  6. Valgrind: [sajjt]. URL: http://valgrind.org.
  7. LTTng: an open source tracing framework for Linux: [sajjt]. URL: http://lttng.org.