信息系统的安全认证和授权方法

Korchenko Anna, Kryvoruchko Olena, Kostiuk Mykhailo, Kazmirchuk Svitlana, Synichuk Olena, Zakharov Rostyslav
{"title":"信息系统的安全认证和授权方法","authors":"Korchenko Anna, Kryvoruchko Olena, Kostiuk Mykhailo, Kazmirchuk Svitlana, Synichuk Olena, Zakharov Rostyslav","doi":"10.1109/ATIT50783.2020.9349333","DOIUrl":null,"url":null,"abstract":"There are many ways to organize authentication and authorization in information systems. Typically, authentication is used to provide login, and authentication is primarily a security tool for personal user data. It is the first level of protection against receiving any system information. In turn, authorization helps ensure data integrity when running multiple different users with different permissions. The security of information and communication systems includes the protection of information circulating in computer systems designed for storing, searching and processing information (databases, application programs, control systems for various devices, etc.) and computer systems intended for disseminating information (Internet, local control and wireless networks, mobile communications, radio communications, satellite communications, etc.), from unauthorized access, counterfeiting and destruction. In our time, the information and communication revolution is the most urgent task, the solution of which is important for security in various areas of human activity that use computer technology and telecommunications. This article considered the existing mechanisms of authentication and authorization, and their advantages and disadvantages that affect the cybersecurity of informational systems. Theoretical and methodological requirements for the use of standardized methods of information systems log in are stated.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Methods of Security Authentication and Authorization into Informationals Systems\",\"authors\":\"Korchenko Anna, Kryvoruchko Olena, Kostiuk Mykhailo, Kazmirchuk Svitlana, Synichuk Olena, Zakharov Rostyslav\",\"doi\":\"10.1109/ATIT50783.2020.9349333\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are many ways to organize authentication and authorization in information systems. Typically, authentication is used to provide login, and authentication is primarily a security tool for personal user data. It is the first level of protection against receiving any system information. In turn, authorization helps ensure data integrity when running multiple different users with different permissions. The security of information and communication systems includes the protection of information circulating in computer systems designed for storing, searching and processing information (databases, application programs, control systems for various devices, etc.) and computer systems intended for disseminating information (Internet, local control and wireless networks, mobile communications, radio communications, satellite communications, etc.), from unauthorized access, counterfeiting and destruction. In our time, the information and communication revolution is the most urgent task, the solution of which is important for security in various areas of human activity that use computer technology and telecommunications. This article considered the existing mechanisms of authentication and authorization, and their advantages and disadvantages that affect the cybersecurity of informational systems. Theoretical and methodological requirements for the use of standardized methods of information systems log in are stated.\",\"PeriodicalId\":312916,\"journal\":{\"name\":\"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ATIT50783.2020.9349333\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ATIT50783.2020.9349333","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在信息系统中,有许多组织身份验证和授权的方法。通常,身份验证用于提供登录,身份验证主要是个人用户数据的安全工具。它是防止接收任何系统信息的第一级保护。反过来,授权有助于在运行具有不同权限的多个不同用户时确保数据完整性。信息和通信系统的安全包括保护为存储、搜索和处理信息而设计的计算机系统(数据库、应用程序、各种设备的控制系统等)和用于传播信息的计算机系统(互联网、本地控制和无线网络、移动通信、无线电通信、卫星通信等)中的信息流通,使其免遭未经授权的访问。伪造和破坏。在我们这个时代,信息和通信革命是最紧迫的任务,解决这一问题对使用计算机技术和电信的人类活动的各个领域的安全至关重要。本文考虑了现有的认证和授权机制,以及它们影响信息系统网络安全的优缺点。阐述了使用标准化信息系统登录方法的理论和方法要求。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Methods of Security Authentication and Authorization into Informationals Systems
There are many ways to organize authentication and authorization in information systems. Typically, authentication is used to provide login, and authentication is primarily a security tool for personal user data. It is the first level of protection against receiving any system information. In turn, authorization helps ensure data integrity when running multiple different users with different permissions. The security of information and communication systems includes the protection of information circulating in computer systems designed for storing, searching and processing information (databases, application programs, control systems for various devices, etc.) and computer systems intended for disseminating information (Internet, local control and wireless networks, mobile communications, radio communications, satellite communications, etc.), from unauthorized access, counterfeiting and destruction. In our time, the information and communication revolution is the most urgent task, the solution of which is important for security in various areas of human activity that use computer technology and telecommunications. This article considered the existing mechanisms of authentication and authorization, and their advantages and disadvantages that affect the cybersecurity of informational systems. Theoretical and methodological requirements for the use of standardized methods of information systems log in are stated.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信