ANALYSIS AND RESEARCH OF THE MODEL OF INFORMATION SECURITY VIOLATOR FOR A SECURED INTERNET ACCESS NODE

Abstract

The paper analyzes and researches the model of the information security violator for a secured Internet access node. The general classification of information security violators circulating in a secured Internet access node is given. The specifications of the violator model based on violations, on the level of qualification and awareness, on the indicator of possibilities of using means for realization of threats, by time of action, by place of action are given. It is shown that the development of an adequate and the most comprehensive model of information security violator is an obligatory stage in construction of a secured Internet access node. It is shown that realization of this stage will allow to secure its resources, including information, from the destructive influence of the violator of any type.

Authors and Affiliations

М. Ю. Комаров, А. В. Ониськова, С. Ф. Гончар

Keywords

Related Articles

SYSTEM ANALYSIS OF ABSTRACT DATA TYPES IN PROBABILISTIC PROGRAMMING LANGUAGES

Today, there are quite a few different probabilistic programming languages that to some extent use the concepts of probability theory for their calculations. But we wanted to know what data types exist for solving probab...

SOME ASPECTS OF GEOMETRICAL MODELING OF TECHNICAL OBJECTS AND PROCESSES FOR FORMING POLYMER COMPOSITES. 2. MODELING OF THE STRUCTURE OF DISPERSE-FILLED THERMOSETS, AS WELL AS THE DESIGN OF TECHNOLOGY AND EQUIPMENT FOR MOLDING POLYMER COMPOSITES

Various aspects of geometric modeling of technical objects and processes of molding of unfilled and filled polymer composites are analyzed. The problems of modeling the structure and properties of disperse-filled thermos...

UKRAINIAN CUISINE IN THE CONTEXT OF MODERN NUTRITION

The article presents research data on the development of new technology dumplings of high biological value. To improve the biological value of buckwheat flour added and rye bran. Based on the results obtained, a new reci...

OPTIMIZATION OF THE PARAMETERS OF THE MOBILE ROBOT WITH GAS GENERATOR OF ENERGY

The article describes a fundamentally new design of a mobile robot with a gas energy storage and a mathematical model for optimizing its parameters. The optimization criteria for the design and technological parameters t...

INFORMATION TECHNOLOGY IN MANAGEMENT PROBLEMS ENVIRONMENTAL SAFETY MILITARY OBJECTS

The article deals with the conceptual issues of the development of the information-analytical system of environmental safety management for military objects and the prospects for its use in the Armed Forces of Ukraine.

Download PDF file
  • EP ID EP579930
  • DOI -
  • Views 74
  • Downloads 0

How To Cite

М. Ю. Комаров, А. В. Ониськова, С. Ф. Гончар (2018). ANALYSIS AND RESEARCH OF THE MODEL OF INFORMATION SECURITY VIOLATOR FOR A SECURED INTERNET ACCESS NODE. Вчені записки Таврійського національного університету імені В. І. Вернадського. Серія: Технічні науки, 29(5), 138-142. https://europub.co.uk/articles/-A-579930