Abstract

The paper focuses on the formation of general schemes describing access to protected information or other resources, and, thereby, the boundaries of countering real and potential threats to these resources. Three main access environments are considered: information, physical and electromagnetic. For the first two, as for the most important, the main access points are highlighted. Nine boundaries are distinguished for the information environment, and seven boundaries for the physical environment. Dedicated boundaries encompass both the external perimeter of the protection object and the internal zone of the object, as well as the data carriers. On the basis of the analysis of the content of the allocated access boundaries, a list of information security functions that are needed at each access boundary and in the protection system as a whole has been formed. This list includes more than thirty basic functions and technological procedures. The presence of this list is one of the foundations for the formation of an integrated information security system that provides multi-level safety of protected information resources.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call