Formalization of the analysis of the vulnerabilities of the information system in the design of KSZI
https://doi.org/10.20914/2310-1202-2017-2-107-112
Abstract
About the Authors
I. E. GrabezhovRussian Federation
candidate of technical sciences, assistant professor, computer technologies and systems department, Bulvar 50-letiya Oktyabrya, 7, Bryansk, 241035, Russia
Ju. A. Leonov
candidate of technical sciences, assistant professor, computer technologies and systems department, Bulvar 50-letiya Oktyabrya, 7, Bryansk, 241035, Russia
References
1. Averchenkov V.I., Rytov M.Yu., Kuvyklin A.V., Rudanovskii M.V. Audit informatsionnoi bezopasnosti organov ispolnitel'noi vlasti [Information security audit of the Executive bodies]. Moscow. Flinta 2011. 100 p. (in Russian).
2. Whitman M. E., Mattord H. J. Principles of information security. Cengage Learning, 2011.
3. GOST no. 13335-1-2006. Informatsionnye tekhnologii. Metody i sredstva obespecheniya bezopasnosti [State standard no. 13335-1-2006. Information technology. Methods and means of security]. (in Russian).
4. Ifinedo P. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security. 2012. vol. 31. no. 1. pp. 83-95.
5. Kazakov Yu.M., Leonov Yu.A., Fedorov V.E. Modeling rational schemes of basing of the workpiece in the solution of the problem of synthesis of individual technological processes. XI Mezhdunarodnaya nauchno-prakticheskaya konferentsiya "Mikhailo-Arkhangel'skie chteniya". 2016. pp. 203–235. (in Russian).
6. Tishchenko A.A., Kazakov Yu.M. The method of decision-making about the production of a new product in the initial stages of development at the marketing management approach. Vestnik Slavyanskikh vuzov: ezhegodnyi mezhdunarodnyi nauchno-prakticheskii zhurnal [Journal of Slavic universities: the annual international scientific-practical journal]. 2015. no. 4. pp. 127–130. (in Russian).
7. Averchenkov A.V., Fisun A.P. A multilevel model of personnel identification in the control system and access control at the enterprises of construction industry. Stroitel'stvo i rekonstruktsiya [Construction and reconstruction]. 2016. no. 2. pp. 56–64. (in Russian).
8. Tankard C. Advanced persistent threats and how to monitor and deter them. Network security. 2011. vol. 2011. no. 8. pp. 16-19.
Review
For citations:
Grabezhov I.E., Leonov J.A. Formalization of the analysis of the vulnerabilities of the information system in the design of KSZI. Proceedings of the Voronezh State University of Engineering Technologies. 2017;79(2):107-112. (In Russ.) https://doi.org/10.20914/2310-1202-2017-2-107-112