{"title":"专业信息技术在恶意软件影响下保证信息容错性、生存性和保护的方法","authors":"M. Stetsiuk, A. Kashtalian","doi":"10.31891/csit-2022-1-5","DOIUrl":null,"url":null,"abstract":"The paper examines the provision of fault tolerance, survivability and protection of IT information on the impact of malicious software and computer attacks. Each method is presented separately by its steps. The states of hardware and software on which the implemented methods are impelled in the corresponding systems are investigated. The common states are singled out and on the basis of them and together with the steps of the methods the synthesis of the method of ensuring fault tolerance, survivability and protection of IT information is carried out. It combines three developed methods. This method is represented by four generalized steps. All representations of the models are made by graphs with weight vertices, which specify either the states or steps of the methods. This representation made it possible to connect common vertices.Some methods of ensuring resilience, survivability and protection of IT information under the influence of malicious software were compared with one integrated method. Experimental studies confirm the effectiveness of both the proposed solution to ensure fault tolerance, survivability and protection of IT information and the effectiveness of the method, which combines the provision of fault tolerance, survivability and protection of IT information.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"THE METHODS OF ENSURING FAULT TOLERANCE, SURVIVABILITY AND PROTECTION OF INFORMATION OF SPECIALIZED INFORMATION TECHNOLOGIES UNDER THE INFLUENCE OF MALICIOUS SOFTWARE\",\"authors\":\"M. Stetsiuk, A. Kashtalian\",\"doi\":\"10.31891/csit-2022-1-5\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper examines the provision of fault tolerance, survivability and protection of IT information on the impact of malicious software and computer attacks. Each method is presented separately by its steps. The states of hardware and software on which the implemented methods are impelled in the corresponding systems are investigated. The common states are singled out and on the basis of them and together with the steps of the methods the synthesis of the method of ensuring fault tolerance, survivability and protection of IT information is carried out. It combines three developed methods. This method is represented by four generalized steps. All representations of the models are made by graphs with weight vertices, which specify either the states or steps of the methods. This representation made it possible to connect common vertices.Some methods of ensuring resilience, survivability and protection of IT information under the influence of malicious software were compared with one integrated method. Experimental studies confirm the effectiveness of both the proposed solution to ensure fault tolerance, survivability and protection of IT information and the effectiveness of the method, which combines the provision of fault tolerance, survivability and protection of IT information.\",\"PeriodicalId\":353631,\"journal\":{\"name\":\"Computer systems and information technologies\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer systems and information technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31891/csit-2022-1-5\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer systems and information technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31891/csit-2022-1-5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
THE METHODS OF ENSURING FAULT TOLERANCE, SURVIVABILITY AND PROTECTION OF INFORMATION OF SPECIALIZED INFORMATION TECHNOLOGIES UNDER THE INFLUENCE OF MALICIOUS SOFTWARE
The paper examines the provision of fault tolerance, survivability and protection of IT information on the impact of malicious software and computer attacks. Each method is presented separately by its steps. The states of hardware and software on which the implemented methods are impelled in the corresponding systems are investigated. The common states are singled out and on the basis of them and together with the steps of the methods the synthesis of the method of ensuring fault tolerance, survivability and protection of IT information is carried out. It combines three developed methods. This method is represented by four generalized steps. All representations of the models are made by graphs with weight vertices, which specify either the states or steps of the methods. This representation made it possible to connect common vertices.Some methods of ensuring resilience, survivability and protection of IT information under the influence of malicious software were compared with one integrated method. Experimental studies confirm the effectiveness of both the proposed solution to ensure fault tolerance, survivability and protection of IT information and the effectiveness of the method, which combines the provision of fault tolerance, survivability and protection of IT information.