Security system integration in information systems for IT projects
dc.contributor.author | Koshkin, Volodymyr Konstantinovich | en |
dc.contributor.author | Mandra, Andriy Valerievich | en |
dc.date.accessioned | 2018-03-13T12:20:28Z | |
dc.date.available | 2018-03-13T12:20:28Z | |
dc.date.issued | 2018 | |
dc.description.abstract | The frequency of unauthorized actions to information systems (IS) in the process of their integration is steadily increasing, which inevitably leads to huge financial and material losses. According to statistics, internal users of IS, commit more than half of all violations. All of this forms "a dangerous group of risk". Existing approaches for IS security are mainly provided by specialized tools of differentiation of user access to information resources. The legal maintenance of information security is a set of laws, legal documents, regulations, instructions, manuals, requirements which are required in the information security system. Organizational and administrative support of the information security is a regulation of industrial activity and the relationship between performers in the legal and regulatory basis in the way that disclosure, leakage and unauthorized access to inform ation come impossible or significantly hampered by carrying out organizational activities. The technical tools of protection include the hardware, software and cryptographic protection, which make difficult to attack, and help detect the fact of its occurrence, and help to get rid of the consequences of an attack. Behavioral methods, unlike signature, is based on models of IS with regular process operation and not based on information attacks models. The principle of behavioral methods is to detect discrepancies between the current modes of the operation of IS and full-mode model is laid down in the method parameters. Any such discrepancy is considered as an information attack. The algorithm of the signature method concerns to find the source of attack signatures in the data collected by the network and host intrusion detection system sensors. In the case that the required signatures are founded, intrusion detection system records the fact of the information attack, which corresponds to the signature found. The disadvantage of this group of methods is the difficulty of creating accurate models of the normal mode of IS functionality. | en |
dc.description.abstract | Частота несанкціонованих дій інформаційних систем (ІС) у процесі їх інтеграції неухильно зростає, що неминуче призводить до величезних фінансових та матеріальних збитків. За статистикою, внутрішні користувачі ІС, здійснюють більше половини всіх порушень. Все це формує "небезпечну групу ризику". Існуючі підходи до безпеки ІС в основному забезпечуються спеціалізованими інструментами диференціації доступу користувачів до інформаційних ресурсів. | uk |
dc.identifier.citation | Koshkin V. K. Security system integration in information systems for IT projects / V. K. Koshkin, A. V. Mandra // Вісник Національного технічного університету "ХПІ". Серія: Стратегічне управління, управління портфелями, програмами та проектами = Bulletin of the National Technical University "KhPI". Series: Strategic management, portfolio, program and project management : зб. наук. пр. – Харків : НТУ "ХПІ", 2018. – № 2 (1278). – С. 69-72. | en |
dc.identifier.doi | 10.20998/2413-3000.2018.1278.10 | |
dc.identifier.uri | https://repository.kpi.kharkov.ua/handle/KhPI-Press/34972 | |
dc.language.iso | en | |
dc.publisher | НТУ "ХПІ" | uk |
dc.subject | IS | en |
dc.subject | intrusion detection system | en |
dc.subject | behavioral method | en |
dc.subject | signature method | en |
dc.subject | система виявлення вторгнень | uk |
dc.subject | поведінковий метод | uk |
dc.subject | метод підпису | uk |
dc.title | Security system integration in information systems for IT projects | en |
dc.title.alternative | Інтеграція системи безпеки в інформаційних системах для ІТ-проектів | uk |
dc.type | Article | en |
Файли
Контейнер файлів
1 - 1 з 1
- Назва:
- vestnik_KhPI_2018_2_Koshkin_Security.pdf
- Розмір:
- 502.82 KB
- Формат:
- Adobe Portable Document Format
- Опис:
Ліцензійна угода
1 - 1 з 1
Ескіз недоступний
- Назва:
- license.txt
- Розмір:
- 11.21 KB
- Формат:
- Item-specific license agreed upon to submission
- Опис: