|
advertisement |
|
|
|
|
|
|
Industrial Automatic Control Systems and Controllers Annotation << Back
Methodological Aspects of Constructing a Functional Model of Threats of Unauthorized Access to Computer Information |
S.V. Skryl’, V.M. Sychev, T.V. Meshcheryakova, Yu.S. Nikitina, V.V. Gayfulin, A.A. Suvorov
The article substantiates the necessity of functional representation of actions of the information security violator in the process of realization of threats of unauthorized access to information in computer systems. The compositional structure of the functional model of such threats is given. The possibility of an adequate assessment of the characteristics of threats of unauthorized access to computer information in order to eliminate the shortcomings of heuristic assessment of information security in computer systems and the correct justification of protection methods is substantiated.
Keywords: computer systems; unauthorized access to computer information; functional model of unauthorized access to information in computer systems.
DOI: 10.25791/asu.11.2019.998
Contacts: -
Pp. 48-59. |
|
|
|
Last news:
Выставки по автоматизации и электронике «ПТА-Урал 2018» и «Электроника-Урал 2018» состоятся в Екатеринбурге Открыта электронная регистрация на выставку Дефектоскопия / NDT St. Petersburg Открыта регистрация на 9-ю Международную научно-практическую конференцию «Строительство и ремонт скважин — 2018» ExpoElectronica и ElectronTechExpo 2018: рост площади экспозиции на 19% и новые формы контент-программы Тематика и состав экспозиции РЭП на выставке "ChipEXPO - 2018" |