Abstract

The article synthesizes an analytical model of threats of inter-module interaction in the information security system. For this purpose, a formalization of the latter elementary entities in terms of set theory is introduced: modules, information objects, attacks, and boundaries. The introduced formalization is applied to describe 6 typical threats of information-technical interaction in the information security system, the model of which was obtained earlier. Their brief formulation is given, and the conditions of occurrence in aspects of the introduced and formalized elementary entities are interpreted. For each threat a graphical example of occurrence and its analytical record in the notation of predicate logic are given. The negation operation is applied to the statement “conditions of threat existence”, which allows to obtain formally a way to counteract it, which is interpreted as a requirement to the information security system.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call