S.V. Pasechnikov – Post-graduate Student,
Moscow Technological University;
Head of Department,
JSC «Concern «Morinformsystem-Agat» (Moscow)
E-mail: pasechnikov_sv@mail.ru
V.V. Avdeev – Post-graduate Student, Moscow Technological University;
software engineer,
JSC «Concern «Morinformsystem-Agat» (Moscow)
E-mail: seva90394@gmail.com
The article presents an analysis of the different approaches of granting access rights to information systems and also describes the need to ensure the security of stored information.
Every company has its own information systems nowadays. These systems are used to create and to store every type of data, including commercial classified information. All employees must be provided with the correct access to information systems. The mode of access depends on the level of the employee's position. There are two main modes. The first allows only reading files and the second to create and edit data. There are also more specialized options for granting access rights. For example, the user is allowed to create files, but he can’t transfer them to an external drive. The issue of quality approach of providing access rights to information systems is a serious aspect of any company's activity.
To solve such issue there are modern control systems. These systems are a preventive measure to prevent information leaks. They allow companies to manage access based on roles and monitor current rights of employees. Based on the current policy of granting access rights to information systems, they monitor all changes on target systems and manage them.
The task of creating an effective management system for granting access rights to information is relevant not only for the large corporations, industrials and oil holdings, but also for small companies that have a high level of automation, work with personal data or have the commercial classified information.
Modern control systems for granting access rights allow us to solve a number of tasks that arise when building a secure information management system, such as:
creating your own tool for monitoring the configuration of the subsystem; information security; minimizing privileges and non-excess user permissions; monitoring the execution of access requests; find out at any time who, when, and why got access to the information resource and does this comply with the security policy. Providing access rights to information systems is a very complex process that affects various organizational mechanisms. It should be elaborated in detail. Modern control systems for granting access rights allow companies to do it, by following the data security policy.
- Vasil'kov A.V., Vasil'kov I.A. Bezopasnost' i upravlenie dostupom v informacionnyh sistemah. M.: Mir. 2015. S. 368 (In Russian).
- Izbachkov Yu. Petrov V. Informacionnye sistemy. M.: Nauka. 2014. S. 656 (In Russian).
- Put'kina L.V., Piskunova T.G. Intellektual'nye informacionnye sistemy. M.: SPbGUP. 2015. S. 228 (In Russian).
- Belen'kaya M.N., Malinovskij S.T., YAkovenko N.V. Administrirovanie v informacionnyh sistemah. M.: Goryachaya liniya – Telekom. 2014. S. 400 (In Russian).
- Elsum D.L., Dirden Dzh., Vajzenbaum Dzh. Informacionnye sistemy – mif i dejstvitel'nost'. M.: Znanie. 2014. S. 157 (In Russian).
- Mezencev K.N. Avtomatizirovannye informacionnye sistemy. M.: Akademiya. 2016. S. 176 (In Russian).
- Vdovenko L.A. Informacionnaya sistema predpriyatiya. M.: Vuzovskij uchebnik, Infra-M, 2016. S. 240 (In Russian).
- Volosenkov V.O. Ocenka ugroz informacionnoj bezopasnosti raspredelennyh vychislitel'nyh system. Sovremennye tekhnologii v nauke i obrazovanii. STNO -2016. S. 4–6 (In Russian).
- Krinickij N.A., Mironov G.A., Frolov G.D. Avtomatizirovannye informacionnye sistemy. M.: Nauka. 2016. S. 82 (In Russian).