Abstract

Objective. The purpose of the study is to analyze the features of the functioning of protected automated systems and develop a structural diagram of a typical ATS AS, which includes various structural elements.Method. As a fundamental method of conducting research is the method of system analysis.Result. Based on the developed typical structural diagram of the ATS AS, threats to web servers were identified in accordance with the official website of the FSTEC, and, in accordance with them, potential vulnerabilities (weak points in terms of information security) were identified; a classification of all potentially dangerous threats to the information resource of protected ATS automated systems was developed and presented.Conclusion. The materials of the article can be used to analyze and develop a methodology for quantitatively assessing the risks of information security violations of the web servers of the ATS of the Russian Federation; methods for assessing the level of security of the ATS of the Russian Federation; methods of access of regular users of the RF ATS AS to the information resource of these systems based on semantic analysis.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call