IMPLEMENTATION OF GROUP DETERMINATION OF FUNCTIONAL PROFILE OF SECURITY AND LEVEL OF GUARANTEES OF INFORMATION AND TELECOMMUNICATION SYSTEM AGAINST UNAUTHORIZED ACCESS

S. Buchyk, O. Yudin, R. Netrebko
{"title":"IMPLEMENTATION OF GROUP DETERMINATION OF FUNCTIONAL PROFILE OF SECURITY AND LEVEL OF GUARANTEES OF INFORMATION AND TELECOMMUNICATION SYSTEM AGAINST UNAUTHORIZED ACCESS","authors":"S. Buchyk, O. Yudin, R. Netrebko","doi":"10.17721/ists.2019.1.11-18","DOIUrl":null,"url":null,"abstract":"The article proposes, shows and analyzes the main stages of implementing software for group assessment of a functional profile and determining or agreeing the level of guarantees for the correct implementation of functional security services in information security tools of information of telecommunication systems from unauthorized access in Ukraine based on theoretical studies previously conducted. The necessary regulatory documents on technical protection of information governing the procedure of evaluating and determining the level of guarantees of automated systems against unauthorized access in Ukraine are covered. The program was designed using the Data Flow Diagram, namely, a contextual diagram of the group definition process and a decomposed diagram of the process of group determination of the functional security profiles and the level of guarantees. More detailed flowcharts of software and algorithms are constructed. A prototype of the software is implemented; examples of work on each of the main blocks of work that were previously designed in the diagrams and flowcharts of the algorithms are given. Certain advantages and disadvantages of the developed software for group determination of the functional security profile and the level of guarantees are defined. The developed program allows to carry out group estimation and to compare the results sent to the server. This approach reduces the time spent by the security administrator to determine the security profiles and security levels of the information being processed against unauthorized access and to detect whether a specified functional profile coincides with a standard one (provided this match the user is provided with information about that standard functional profile) or determine another level of warranty. By conducting a group examination, the reliability of the obtained results increases","PeriodicalId":426827,"journal":{"name":"Information systems and technologies security","volume":"164 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information systems and technologies security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17721/ists.2019.1.11-18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The article proposes, shows and analyzes the main stages of implementing software for group assessment of a functional profile and determining or agreeing the level of guarantees for the correct implementation of functional security services in information security tools of information of telecommunication systems from unauthorized access in Ukraine based on theoretical studies previously conducted. The necessary regulatory documents on technical protection of information governing the procedure of evaluating and determining the level of guarantees of automated systems against unauthorized access in Ukraine are covered. The program was designed using the Data Flow Diagram, namely, a contextual diagram of the group definition process and a decomposed diagram of the process of group determination of the functional security profiles and the level of guarantees. More detailed flowcharts of software and algorithms are constructed. A prototype of the software is implemented; examples of work on each of the main blocks of work that were previously designed in the diagrams and flowcharts of the algorithms are given. Certain advantages and disadvantages of the developed software for group determination of the functional security profile and the level of guarantees are defined. The developed program allows to carry out group estimation and to compare the results sent to the server. This approach reduces the time spent by the security administrator to determine the security profiles and security levels of the information being processed against unauthorized access and to detect whether a specified functional profile coincides with a standard one (provided this match the user is provided with information about that standard functional profile) or determine another level of warranty. By conducting a group examination, the reliability of the obtained results increases
实施对信息和电信系统的安全功能概况和防止未经授权访问的保证级别的小组确定
本文提出,展示和分析了实施软件的主要阶段,用于对功能概况进行组评估,并根据先前进行的理论研究确定或同意在乌克兰电信系统信息信息安全工具中正确实施功能安全服务的保证水平,以防止未经授权的访问。其中包括关于信息技术保护的必要规范性文件,这些文件规定了评估和确定乌克兰自动系统防止未经授权访问的保证水平的程序。程序采用数据流程图进行设计,即组定义过程的上下文图和组确定功能安全概况和保证等级过程的分解图。给出了较为详细的软件和算法流程图。实现了该软件的原型;给出了在算法的图表和流程图中设计的每个主要工作块的工作示例。定义了所开发软件的某些优点和缺点,用于组确定功能安全概况和保证级别。开发的程序允许进行组估计并比较发送到服务器的结果。这种方法减少了安全管理员用于确定针对未经授权访问所处理的信息的安全配置文件和安全级别,以及检测指定的功能配置文件是否与标准配置文件一致(如果与标准功能配置文件相匹配,则向用户提供有关该标准功能配置文件的信息)或确定另一个保证级别所花费的时间。通过进行分组检验,所得结果的可靠性提高了
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信