9 research outputs found

    EFFICIENCY INDICATORS INFORMATION MANAGEMENT IN INTEGRATED SECURITY SYSTEMS

    No full text
    Summary. Introduction of information technology to improve the efficiency of security activity leads to the need to consider a number of negative factors associated with in consequence of the use of these technologies as a key element of modern security systems. One of the most notable factor is the exposure to information processes in protection systems security threats. This largely relates to integrated security systems (ISS) is the system of protection with the highest level of informatization security functions. Significant damage to protected objects that they could potentially incur as a result of abnormal operation ISS, puts a very actual problem of assessing factors that reduce the efficiency of the ISS to justify the ways and methods to improve it. Because of the nature of threats and blocking distortion of information in the ISS of interest are: the volume undistorted ISF working environment, as a characteristic of data integrity; time access to information as a feature of its availability. This in turn leads to the need to use these parameters as the performance characteristics of information processes in the ISS - the completeness and timeliness of information processing. The article proposes performance indicators of information processes in integrated security systems in terms of optimal control procedures to protect information from unauthorized access. Set the considered parameters allows to conduct comprehensive security analysis of integrated security systems, and to provide recommendations to improve the management of information security procedures in them

    PUBLIC ADMINISTRATION SYSTEM: CRISIS IN LEADERSHIP AND THE NEED OF INSTITUTIONAL REFORMS IN RUSSIA

    No full text
    The authors consider the main problems, which have been an obstacle to develop a modern public administration system in Russia. The main reasons of the low efficiency of public administration, crisis in leadership and the prevailing ways of institutional reform are clarified in the paper. The article gives the analysis of the crisis in management of public administration system. The authors describe a multidisciplinary approach to the implementation of effective public administration system and its instruments, which have different competences in a strategic planning. The authors point out the need to create a special government body responsible for the development and implementation of institutional reform

    Inner Size Effect in Layered Films with Eutectic Interaction of Components

    No full text
    The results of the study of melting of Bi-Sn and Pb-Sn polycrystalline layered film systems with the thickness of 200-400 nm on a substrate with temperature gradient are given. Multilayer (each layer is of 10-20 nm) and bilayer films (layers are of 100-200 nm) of the same total thickness have been investigated. Broadening of the melting range in all films and lowering of melting point in multilayer samples compared to the bilayer ones have been observed. The observed phenomena are discussed within existing thermodynamic concepts in consideration of interfacial energy of contacting layers of components and energy of grain boundaries in polycrystalline films

    Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence

    Get PDF
    Formulation of the problem. The completeness of the characteristics of one of the most serious threats to the security of information today – its leakage through the transient electromagnetic pulse emanation standard (TEMPEST) from computer equipment (CE) is determined not only by the number of detectable signs of leakage but also by several other parameters characterizing the dynamics of the implementation of such a threat. The established patterns in the scenarios of violators’ actions associated with the use of technical reconnaissance equipment (TRQ) to intercept informative TEMPEST signals from computer equipment made it possible to form a model of all possible options for using TRQ to obtain confidential information processed by computer equipment. The proposed model provides the implementation of the methodological principles of the recognition theory for a more complete characterization of threats of information leakage through the channels of spurious electromagnetic radiation and interference from CE in the process of their detection.Objective. Development of methodological grounds for presenting signs of the violator’s implementation of certain functions associated with the use of technical reconnaissance equipment to intercept informative signals of spurious electromagnetic radiation and interference from computer equipment as signs that identify the most significant conditions for the recognition and prevention of such threats.Results. Methodological solutions for the identification of three states significant for the prevention of threats are given based on the structuring of the functional representation of the intruder’s actions to implement such threats. Mathematical models for assessing the predicted amount of information disclosed in the process of intercepting TEMPEST informative signals from computer equipment, and assessing the level of security threats in case of interception of information are also presented.Practical significance. The paper presents the main options for the operation of a complex of programs for recognizing threats of information leakage through TEMPEST channels from computer equipment developed within the framework of the presented methodology

    Mathematical models of characteristics of timely response to penetration into a protected area by blocking information in physical protection complexes

    Get PDF
    This article is the first in a series of articles devoted to the issues of physical protection of ships and other watercraft with nuclear power plants and radiation sources during their stay in ports. The principles of construction and functioning of mobile complexes of physical protection of seaports as a new class of integrated automated security systems are considered. The blocking of information in the complex is determined as the most serious vulnerability of such systems. A small amount of data on information protection from blocking in complex and integrated security systems and their absence in systems of the class under consideration is stated. The main reason for the current state of the theory and practice of information protection against blocking in the complexes of physical protection of seaports is determined, which is the lack of a methodological apparatus for mathematical modeling that adequately evaluates the effectiveness of countering penetration into protected areas by blocking information in such security systems. A formal interpretation of the processes under study is given. A conceptual model of violation of the protection regime of the port territory and water area is considered. Mathematical models of particular indicators of the timeliness of response to the actions of violators at individual stages of the penetration into the protected area threat are presented. An integral indicator of timeliness of response to penetration into a protected area by blocking information in the complexes of physical protection of seaports is substantiated
    corecore