DEVELOPMENT OF AN AUTOMATED SYSTEM INTRUDER MODEL
ავტორი: Mykola Brailovskyi, Volodymyr Khoroshko
ორგანიზაცია: Taras Shevchenko National University of Kiev, National Aviation University
კატეგორია:
საკვანძო სიტყვები: penetrator, information security system, penetrator model, set of threats
აბსტრაქტი. The model of the security penetrator of the automated system is developed, on the basis of the use of a 4-level gradation of access to information
ბიბლიოგრაფია
Lenkov S.V., Peregudov D.A., Khoroshko V.A. Methods and means of information protection. In 2 volumes – K: Arii, 2008 (in Russian)
Koboseva A.A., Machalin I.O., Khoroshko V.O. Analysis of the security of information systems. - K .: View. DUIKT 2010 - 316 p. (in Ukrainian)
Buryachok V.L., Grishchuk R.V., Khoroshko V.O. Information Security Policy. - K .: PVP "Zadruga", 2014 - 222 p. (in Ukrainian)
Brailovskyi N.N., Orlenko V.S., Khoroshko V.A. Assessment of the quality of the information security system functioning // Modern information security, #4, 2010. - p. 9-15. (in Russian)
Brailovskyi N.N., Orlenko V.S., Khoroshko V.A. Formation of complex programs for the protection of objects in the presence of threats and risks // Modern information security, № 1, 2011. - p.34-41. (in Russian)
Menu