Developing a methodological approach to assessing state information security

Halyna Andriishena, Roman Chunakov, M. Zaitsev, A. Shyshatskyi
{"title":"Developing a methodological approach to assessing state information security","authors":"Halyna Andriishena, Roman Chunakov, M. Zaitsev, A. Shyshatskyi","doi":"10.21303/2313-8416.2023.002826","DOIUrl":null,"url":null,"abstract":"The object of the research is the system of information security of the state. \nInvestigated problem: The experience of operations (combat operations) of recent years shows the growing role of information influence measures on the systems of collection, processing and transmission of special purpose information and decision-making officials. \nThe specificity of measures to ensure the information security of the state is that, on the one hand, it is necessary to solve the task of collecting, processing and transmitting information, and on the other hand, it is necessary to counteract measures of information influence on the systems of collecting, processing and transmitting information and decision-making officials. \nGiven this, information attacks have become a real threat and are one of the priority problems of national security and risk management. Information security covers all security measures that can be taken to protect against these impacts. A significant increase in the complexity and intensity of information attacks in recent years has forced most developed countries to strengthen their defenses and adopt national information security strategies. \nThe area of practical use of the research results: It is advisable to use the proposed scientific results when conducting research and development works on the creation of intelligent systems for collecting, processing and analyzing information about the state of information security of the state, and developing requirements for hardware and software of this type of systems. \nField of application: software, information systems, decision support systems.","PeriodicalId":30651,"journal":{"name":"ScienceRise","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ScienceRise","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21303/2313-8416.2023.002826","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The object of the research is the system of information security of the state. Investigated problem: The experience of operations (combat operations) of recent years shows the growing role of information influence measures on the systems of collection, processing and transmission of special purpose information and decision-making officials. The specificity of measures to ensure the information security of the state is that, on the one hand, it is necessary to solve the task of collecting, processing and transmitting information, and on the other hand, it is necessary to counteract measures of information influence on the systems of collecting, processing and transmitting information and decision-making officials. Given this, information attacks have become a real threat and are one of the priority problems of national security and risk management. Information security covers all security measures that can be taken to protect against these impacts. A significant increase in the complexity and intensity of information attacks in recent years has forced most developed countries to strengthen their defenses and adopt national information security strategies. The area of practical use of the research results: It is advisable to use the proposed scientific results when conducting research and development works on the creation of intelligent systems for collecting, processing and analyzing information about the state of information security of the state, and developing requirements for hardware and software of this type of systems. Field of application: software, information systems, decision support systems.
发展评估国家信息安全的方法方法
本文的研究对象是国家信息安全体系。调查问题:近年来作战行动的经验表明,信息影响措施对特殊目的信息的收集、处理和传输系统以及决策官员的作用越来越大。保障国家信息安全的措施的特殊性在于,一方面要解决信息收集、处理和传递的任务,另一方面要抵消信息影响措施对信息收集、处理和传递系统和决策官员的影响。有鉴于此,信息攻击已成为现实威胁,成为国家安全和风险管理的优先问题之一。信息安全涵盖了为防止这些影响而采取的所有安全措施。近年来,信息攻击的复杂性和强度显著增加,迫使大多数发达国家加强防御,采取国家信息安全战略。研究成果的实际应用领域:建议在开展研究和开发工作时使用拟议的科学成果,以创建用于收集、处理和分析有关国家信息安全状况的信息的智能系统,并制定此类系统的硬件和软件要求。应用领域:软件、信息系统、决策支持系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
17
审稿时长
3 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信