Development of a methodology for building an information security system in the corporate research and education system in the context of university autonomy
Journal Title: Восточно-Европейский журнал передовых технологий - Year 2019, Vol 3, Issue 9
Abstract
<p>The development of computing tools and technologies of corporate networks has expanded the range of educational and information services in corporate research and education networks (CRES). CRES belong to critical cybernetic information systems (CCIS) built on the basis of open network models. In the early 80s of the 20th century, this approach did not consider the need to build a security system, which does not allow it to provide the required level of protection against modern hybrid threats. The transition to autonomy in decision-making, education and university management all over the world places requirements to ensuring the required quality of service (QoS) of CRES clients. CRES users include university administration, faculty, students and support personnel of educational services in higher education institutions. One of the main criteria for QoS is information security. However, there is no general approach to building integrated information security in CRES, which would provide the required level of security.</p><p>The methodology is based on the concept of synthesizing a synergistic model of threats to CCIS, improved models of CRES infrastructure, an intruder, assessing the current state of information security (IS) and improved method of investment in the CRES IS. It is shown that the basis of the synergistic model is a three-level model of strategic security management, which provides a synergistic effect in the context of simultaneous threats to information security, cybersecurity and security of information. In contrast to the known, such an approach provides for the determination of qualitatively new and previously unknown emergent properties of the information security system, taking into account the means used to create it. The application of the methodology in practice through the development and implementation of new solutions to provide security services allows for the required level of information security in CRES. The proposed information security service mechanisms are built on hybrid cryptosystems based on crypto-code structures with flawed codes.</p>
Authors and Affiliations
Serhii Yevseiev, Volodymyr Aleksiyev, Svitlana Balakireva, Yevhen Peleshok, Oleksandr Milov, Oleksii Petrov, Olena Rayevnyeva, Bogdan Tomashevsky, Ivan Tyshyk, Olexander Shmatko
Development of lean titaniumalloyed aluminium alloy for electrotechnical purposes
<p>The influence of titanium amount and pouring temperature on the structure and properties of lean-alloyed alloy was explored. It was determined that lean titanium-alloyed aluminum alloys have better mechanical and elec...
Development of planar mesoscale combustor with double narrow slit flame holder and various aspect ratios for micropower generator
We have investigated the effects of the aspect ratio of the rectangular mesoscale combustor with a narrow slit flame holder on the flame <span lang="EN-ID">stability limit</span>, flame behavior and uniformity of combust...
Modelling the loading of the nose-free cutting edges of face mill with a spiral-stepped arrangement of inserts
<p>A mathematical model of loading of the nose-free cutting edges of each insert of the face mill with a spiral-stepped cutting scheme was created. It was established that the size of the cut elements depends on the feed...
Contour milling programming technology for virtual basing on a CNC machine
A new technique and an application program for automating the programming of the milling operation during virtual basing of the workpiece on the CNC machine table is presented, when precise installation of the workpiece...
Construction of algorithms to automatically determine individual indicators when assessing the shape quality of cross-wound packages
<p>The paper addresses issues related to the selection of individual indicators to estimate the shape quality of cross-wound packages, as well as the construction of algorithms to determine them automatically.</p><p>We h...