{"title":"根据信息安全要求,无线电电信硬件-软件认证范式的演变","authors":"A. Markov, Yu. Rautkin, D. Luchin, V. Tsirlov","doi":"10.1109/SIBCON.2015.7147139","DOIUrl":null,"url":null,"abstract":"The problems of certification of radio telecommunication hardware-software in accordance with information security requirements are discussed. The situation where certification of hardware-software is being mandatory is reviewed. The key features of certification, methodological levels of certification and indicators of the effectiveness of the certification process are formulated. The drawbacks of the modern paradigm of certification are shown. The necessity of the shift of certification paradigm is substantiated. The approaches to ensure the completeness checks of hardware and software products on information security requirements are offered. The results of long-term statistics of certification testing of software and hardware products are presented.","PeriodicalId":395729,"journal":{"name":"2015 International Siberian Conference on Control and Communications (SIBCON)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Evolution of a radio telecommunication hardware-software certification paradigm in accordance with information security requirements\",\"authors\":\"A. Markov, Yu. Rautkin, D. Luchin, V. Tsirlov\",\"doi\":\"10.1109/SIBCON.2015.7147139\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The problems of certification of radio telecommunication hardware-software in accordance with information security requirements are discussed. The situation where certification of hardware-software is being mandatory is reviewed. The key features of certification, methodological levels of certification and indicators of the effectiveness of the certification process are formulated. The drawbacks of the modern paradigm of certification are shown. The necessity of the shift of certification paradigm is substantiated. The approaches to ensure the completeness checks of hardware and software products on information security requirements are offered. The results of long-term statistics of certification testing of software and hardware products are presented.\",\"PeriodicalId\":395729,\"journal\":{\"name\":\"2015 International Siberian Conference on Control and Communications (SIBCON)\",\"volume\":\"96 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-05-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Siberian Conference on Control and Communications (SIBCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SIBCON.2015.7147139\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Siberian Conference on Control and Communications (SIBCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIBCON.2015.7147139","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evolution of a radio telecommunication hardware-software certification paradigm in accordance with information security requirements
The problems of certification of radio telecommunication hardware-software in accordance with information security requirements are discussed. The situation where certification of hardware-software is being mandatory is reviewed. The key features of certification, methodological levels of certification and indicators of the effectiveness of the certification process are formulated. The drawbacks of the modern paradigm of certification are shown. The necessity of the shift of certification paradigm is substantiated. The approaches to ensure the completeness checks of hardware and software products on information security requirements are offered. The results of long-term statistics of certification testing of software and hardware products are presented.