Mathematical models and methods for solving some problems on the information security

Various mathematical models, methods and approaches are used to solve scientific problems in the field of information security of territorially distributed information computer systems (TDICS). The information security modelling toolkit is represented by the following three main directions: developm...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Datum:2023
Hauptverfasser: Никифоров, О. В., Путятін, В. Г., Куценко, С. А.
Format: Artikel
Sprache:Ukrainian
Veröffentlicht: Інститут проблем реєстрації інформації НАН України 2023
Schlagworte:
Online Zugang:http://drsp.ipri.kiev.ua/article/view/300525
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Назва журналу:Data Recording, Storage & Processing

Institution

Data Recording, Storage & Processing
Beschreibung
Zusammenfassung:Various mathematical models, methods and approaches are used to solve scientific problems in the field of information security of territorially distributed information computer systems (TDICS). The information security modelling toolkit is represented by the following three main directions: development of methods and models for monitoring the current state of the system and decision-making for operational management of information security; development of methods and models of decision-making support regarding organizational management and design of information security systems; development of methods and models of system self-organization. On the basis of the first group of methods and models (neural networks, data mining methods, matrix method and problem-oriented methods and models), a wide variety of corporate automated systems, commercial software platforms for information security management have been created. At the same time, there is a strong dependence of the software on the features of the object of protection and the subject area in which the information protection processes are modelled and evaluated. The second group of methods (cognitive maps, finite state machines, Markov and Bayesian networks, ontological models, Petri nets, and the matrix method) is presented to a greater extent in the field of systematic research on the development of information protection systems and the justification of requirements for them. The main scientific problem for this group is the problem of justifying the rational decomposition and linearization of problems when conducting research. It significantly depends on the nature of the subject area where research is conducted. The direction of TRIX research that adapts, changes its structure and parameters depending on external conditions and the transformation of the subject area, represented by the methods of conceptual design. On the basis of these methods, it is possible to solve problems of synthesis of structures of objects (systems) with defined properties. Tabl.: 1. Fig.: 10. Refs: 100 titles.