Вісник № 02

Постійне посилання колекціїhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/34942

Переглянути

Результати пошуку

Зараз показуємо 1 - 1 з 1
  • Ескіз
    Документ
    Security system integration in information systems for IT projects
    (НТУ "ХПІ", 2018) Koshkin, Volodymyr Konstantinovich; Mandra, Andriy Valerievich
    The frequency of unauthorized actions to information systems (IS) in the process of their integration is steadily increasing, which inevitably leads to huge financial and material losses. According to statistics, internal users of IS, commit more than half of all violations. All of this forms "a dangerous group of risk". Existing approaches for IS security are mainly provided by specialized tools of differentiation of user access to information resources. The legal maintenance of information security is a set of laws, legal documents, regulations, instructions, manuals, requirements which are required in the information security system. Organizational and administrative support of the information security is a regulation of industrial activity and the relationship between performers in the legal and regulatory basis in the way that disclosure, leakage and unauthorized access to inform ation come impossible or significantly hampered by carrying out organizational activities. The technical tools of protection include the hardware, software and cryptographic protection, which make difficult to attack, and help detect the fact of its occurrence, and help to get rid of the consequences of an attack. Behavioral methods, unlike signature, is based on models of IS with regular process operation and not based on information attacks models. The principle of behavioral methods is to detect discrepancies between the current modes of the operation of IS and full-mode model is laid down in the method parameters. Any such discrepancy is considered as an information attack. The algorithm of the signature method concerns to find the source of attack signatures in the data collected by the network and host intrusion detection system sensors. In the case that the required signatures are founded, intrusion detection system records the fact of the information attack, which corresponds to the signature found. The disadvantage of this group of methods is the difficulty of creating accurate models of the normal mode of IS functionality.