Abstract

Objectives. In order to investigate the property of the operational effectiveness of automated systems for protecting information from unauthorised access, it is necessary to analyse the normative documents (both international and Russian) and scientific materials devoted to the evaluation of software quality. The aim of the study consists in the analysis of the existing deficiencies in systems for protecting information from unauthorised access, on the basis of which analysis it is possible to develop performance indicators, substantiate and develop the criteria for assessing the operational effectiveness of the information protection systems from unauthorised access in automated information systems and develop an algorithm for the integrated evaluation of the operational effectiveness of information protection systems on the basis of the established criteria and indicators. Methods . One of the methods for solving the set goals consists in the main provisions of efficiency and systems theories, which in turn became the theoretical basis for solving problems involved in the creation of criteria and assessment of performance indicators of information protection systems. Results. The criteria and performance indicators for the creation of automated information systems are developed on the basis of the analysis of open literature sources and existing shortcomings in the real use of systems for protecting information from unauthorised access. An algorithm for the integrated evaluation of the operational effectiveness of the information protection systems is developed. Conclusion. In the article, based on the analysis of normative documents (both international and Russian), as well as on the scientific materials devoted to the quality (function efficiency) of complex software systems, to which the information protection systems can be related, a system of performance indicators was developed. These can be indicators can be classified as partial (static, practically independent of time, the evaluation of which is based on expert estimates) and integral (dynamic, time-dependent, the evaluation of which is based on mathematical modeling).

Highlights

  • In order to investigate the property of the operational effectiveness of automated systems for protecting information from unauthorised access, it is necessary to analyse the normative documents and scientific materials devoted to the evaluation of software quality

  • The aim of the study consists in the analysis of the existing deficiencies in systems for protecting information from unauthorised access, on the basis of which analysis it is possible to develop performance indicators, substantiate and develop the criteria for assessing the operational effectiveness of the information protection systems from unauthorised access in automated information systems and develop an algorithm for the integrated evaluation of the operational effectiveness of information protection systems on the basis of the established criteria and indicators

  • One of the methods for solving the set goals consists in the main provisions of efficiency and systems theories, which in turn became the theoretical basis for solving problems involved in the creation of criteria and assessment of performance indicators of information protection systems

Read more

Summary

12 Ввод VИСЗИ

2. Алгоритм оценки интегрального показателя эффективности функционирования при разработке системы защиты информации от несанкционированного доступа в автоматизированной информационной системе Fig.. При невыполнении условий (2), (9), (10), (11) значение интегрального показателя эффективности функционирования СЗИ от НСД равно нулю. При выполнении условий (2), (9), (10), (11) интегрального показателя эффективности функционирования СЗИ от НСДоценивается по формулеVИСЗИ VВЭСЗИ следующей из равенства (8). Вывод найденного значения интегрального показателя эффективности функционирования СЗИ от НСД(VИСЗИ ) – результата работы алгоритма. Представленные метрики и критерии направлены на повышение уровня надѐжности СЗИ от НСД в АИС с точки зрения выбора оптимальной стратегии функционирования при разработке подобных систем. Проектирование систем защита информации от несанкционированного доступа в автоматизированных системах органов внутренних дел // Вестник Воронежского института МВД России. 3 Эффективность технических систем / под общ.ред. Концепция защиты средств вычислительной техники и автоматизированных систем от несанкционированного доступа к информации.

22. ГОСТ 25010–2015 Требования и оценка качества
20. The Research and Discussion on Effectiveness Evaluation
22. GOST 25010–2015 Trebovaniya i otsenka kachestva sisgrammnogo obespecheniya

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.