Loading…
Implementation of the model and algorithm for assessing the security of information in an automated system
New technologies provide much more progressive ways of working with information. Access to information is provided from anywhere, without geo-referencing. All this causes the emergence of new threats and vulnerabilities. An important task is to ensure the security of data, identify compliance of pro...
Saved in:
Published in: | Journal of physics. Conference series 2019-03, Vol.1210 (1), p.12143 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | New technologies provide much more progressive ways of working with information. Access to information is provided from anywhere, without geo-referencing. All this causes the emergence of new threats and vulnerabilities. An important task is to ensure the security of data, identify compliance of protection systems with the regulatory framework and current threats to information security. Timely audit allows to confirm the necessary level of security or to notify about its shortcomings. The paper presents a developed model for assessing the security of information using intellectual means. The software algorithm for auditing the security status of an automated system for an information security specialist has been implemented and tested. The article presents implemented software for auditing the system of protection of automated systems. The preliminary data of approbation of the developed algorithm and program complex are demonstrated. |
---|---|
ISSN: | 1742-6588 1742-6596 |
DOI: | 10.1088/1742-6596/1210/1/012143 |