Development of a methodology for building an information security system in the corporate research and education system in the context of university autonomy
Journal Title: Восточно-Европейский журнал передовых технологий - Year 2019, Vol 3, Issue 9
Abstract
<p>The development of computing tools and technologies of corporate networks has expanded the range of educational and information services in corporate research and education networks (CRES). CRES belong to critical cybernetic information systems (CCIS) built on the basis of open network models. In the early 80s of the 20th century, this approach did not consider the need to build a security system, which does not allow it to provide the required level of protection against modern hybrid threats. The transition to autonomy in decision-making, education and university management all over the world places requirements to ensuring the required quality of service (QoS) of CRES clients. CRES users include university administration, faculty, students and support personnel of educational services in higher education institutions. One of the main criteria for QoS is information security. However, there is no general approach to building integrated information security in CRES, which would provide the required level of security.</p><p>The methodology is based on the concept of synthesizing a synergistic model of threats to CCIS, improved models of CRES infrastructure, an intruder, assessing the current state of information security (IS) and improved method of investment in the CRES IS. It is shown that the basis of the synergistic model is a three-level model of strategic security management, which provides a synergistic effect in the context of simultaneous threats to information security, cybersecurity and security of information. In contrast to the known, such an approach provides for the determination of qualitatively new and previously unknown emergent properties of the information security system, taking into account the means used to create it. The application of the methodology in practice through the development and implementation of new solutions to provide security services allows for the required level of information security in CRES. The proposed information security service mechanisms are built on hybrid cryptosystems based on crypto-code structures with flawed codes.</p>
Authors and Affiliations
Serhii Yevseiev, Volodymyr Aleksiyev, Svitlana Balakireva, Yevhen Peleshok, Oleksandr Milov, Oleksii Petrov, Olena Rayevnyeva, Bogdan Tomashevsky, Ivan Tyshyk, Olexander Shmatko
Analytical method to study a mathematical model of wave processes under twopoint time conditions
<p>Research and analysis of dynamic processes in oscillatory systems are closely connected to the establishment of exact or approximate analytical solutions to the problems of mathematical physics, which model such syste...
Research into aero acoustic characteristics of two-row impellers of the axial compressor
<p>We have conducted numerical simulation of current in the axial impellers with a single-row and a two-row geometrically equivalent blade crowns with a density of blade crowns over average radius of 1...2.5. The pressur...
Efficiency of the air heater in a heat recovery system at different thermophysical parameters and operational modes of the boiler
<p class="a">We have examined, for the plate heater included in a heat recovery system of the boiler plant, the influence of its thermophysical parameters on the losses of exergetic power under different operational mode...
Devising a procedure to choose optimal parameters for the electromechanical shock absorber for a subway car
<p>A procedure for determining basic estimation parameters has been devised for the proposed structure of the electromechanical shock absorber. The procedure is based on a simplified mathematical model for determining th...
Development of a method of completing emergency rescue units with emergency vehicles
<p>The study considers the process of response of emergency rescue units to emergencies and hazardous events occurring on the territory of a city with a population of more than one million people. It has been determined...