701,171 research outputs found

    RESEARCH OF TRANSIENT RESPONSES IN AUTOMATIC MOBILE CONTROL SYSTEMS OF DISTILLATION PROCESS

    Get PDF
    In modern conditions of growth of informatization, to ensure the reliability of the functioning of distributed computer information-diagnostic and control systems, which are mandatory for consideration, there are problems of assessing security and implementing protection of operational information. The state of information protection and the reliability of computer systems for corporate monitoring and diagnosis of the railway power supply system are analyzed. The main tasks in the intellectualization of component systems are defined, namely traction electric network. The principles of information protection are proposed, which include: active protection of information; convincing protection of information, consisting in the justification of the design and measures to protect the conditions and circumstances. Such a principle as the continuity of the information protection process provides for the organization of the protection of objects at all stages of the development and operation life cycle. A variety of information protection tools provides for the exclusion of patterns at the stage of selecting cover objects and various ways to implement protection, not excluding the use of standard solutions. The combination of the above principles in the work is called an integrated approach to information security, which is the basis for the creation of computer information protection systems. According to the sphere of information security, this approach complies with international ISO standards, and for the technical protection of information and state standards it complies with the requirements of existing national legislative and regulatory documents. To ensure the security of information stored and processed in computer systems, the coordinated application of various security measures is necessary

    RESEARCH OF INFORMATION PROTECTION METHODS IN COMPUTER SYSTEMS FOR MONITORING AND DIAGNOSTICS OF ELECTRIC SUPPLY OF RAILWAYS

    Get PDF
    In modern conditions of growth of informatization, to ensure the reliability of the functioning of distributed computer information-diagnostic and control systems, which are mandatory for consideration, there are problems of assessing security and implementing protection of operational information. The state of information protection and the reliability of computer systems for corporate monitoring and diagnosis of the railway power supply system are analyzed. The main tasks in the intellectualization of component systems are defined, namely traction electric network. The principles of information protection are proposed, which include: active protection of information; convincing protection of information, consisting in the justification of the design and measures to protect the conditions and circumstances. Such a principle as the continuity of the information protection process provides for the organization of the protection of objects at all stages of the development and operation life cycle. A variety of information protection tools provides for the exclusion of patterns at the stage of selecting cover objects and various ways to implement protection, not excluding the use of standard solutions. The combination of the above principles in the work is called an integrated approach to information security, which is the basis for the creation of computer information protection systems. According to the sphere of information security, this approach complies with international ISO standards, and for the technical protection of information and state standards it complies with the requirements of existing national legislative and regulatory documents. To ensure the security of information stored and processed in computer systems, the coordinated application of various security measures is necessary

    Time Protection: the Missing OS Abstraction

    Get PDF
    Timing channels enable data leakage that threatens the security of computer systems, from cloud platforms to smartphones and browsers executing untrusted third-party code. Preventing unauthorised information flow is a core duty of the operating system, however, present OSes are unable to prevent timing channels. We argue that OSes must provide time protection in addition to the established memory protection. We examine the requirements of time protection, present a design and its implementation in the seL4 microkernel, and evaluate its efficacy as well as performance overhead on Arm and x86 processors

    Особенности использования средств технической защиты информации от утечки за счет побочных электромагнитных излучений и наводок

    Get PDF
    The problems of technical protection of national information resources in means of computer facilities automated computer systems and computer networks are esteemed. The directions are formulated, in which one it is necessary to develop activities for protection of the information against outflow at the expense of spurious electromagnetic radiation and aiming, the analysis of available and substantially created now means and methods of protection is carried out. The circle of the most deficient means, systems, techniques and standards in area of technical information protection, and possible paths of their creation as soon as possible is determined.Рассматриваются вопросы технической защиты национальных информационных ресурсов в средствах вычислительной техники, автоматизированных компьютерных системах и сетях ЭВМ. Сформулированы направления, в которых необходимо развивать работы для защиты информации от утечки за счет побочных электромагнитных излучений и наводок, проводится анализ имеющихся и реально создаваемых сейчас средств и методов защиты. Определен круг наиболее дефицитных технических средств, систем, методик и норм в области ТЗИ, и возможные пути их создания в ближайшее время

    Legal information protection of the systems of information support for an enterprise (computer programs and databases)

    Get PDF
    Рассматриваются правовые аспекты защиты информации в информационных системах (компьютерные программы и базы данных) в комплексе с другими видами обеспечения защиты, предложена стратегия защиты электронной информации предприятия.Discusses the legal aspects of information security in information systems (computer programs and databases) in conjunction with other types of protection, the strategy of electronic information protection for an enterprise is proposed

    INFORMATION SYSTEMS IN SCHOOLS AND DATA PROTECTION

    Get PDF
    The steady growth of computer and communication sciences makes schools as organizations more and more dependent on information systems. Schools are organizations and thus they too must comply with the legal requirements concerning the data security. This paper deals with the topic of data protection in the schools information system. While the schools apply the information systems, the information is easier accessible to a growing number of people. Parallel to it, the opportunities of data abuse e.g. computer fraud, espionage, malevolent code etc. are more frequent. Under data protection we understand the data as well as information protection as they are almost always not just pure information but have certain value. The information protection is based above all on three basic principles: integrity, confidentiality and availability. It is suggested that the organization declares its adopted policy and guidelines for management of electronic operations and at the same time assures that they are properly implemented

    INFORMATION SYSTEMS IN SCHOOLS AND DATA PROTECTION

    Get PDF
    The steady growth of computer and communication sciences makes schools as organizations more and more dependent on information systems. Schools are organizations and thus they too must comply with the legal requirements concerning the data security. This paper deals with the topic of data protection in the schools information system. While the schools apply the information systems, the information is easier accessible to a growing number of people. Parallel to it, the opportunities of data abuse e.g. computer fraud, espionage, malevolent code etc. are more frequent. Under data protection we understand the data as well as information protection as they are almost always not just pure information but have certain value. The information protection is based above all on three basic principles: integrity, confidentiality and availability. It is suggested that the organization declares its adopted policy and guidelines for management of electronic operations and at the same time assures that they are properly implemented
    corecore