Abstract
This paper proposes a comprehensive set of characteristics of integrated security systems of electronic document management. We give a classification description and data analysis for modeling decision-making processes in integrated security systems by the example of responding to the threats of information leakage through parametric channels. The optimal set of measures to respond to an attacker’s operations of illegal interception of information via parametric channels by using the appropriate modes of operation of the TCP protocol, which reduces the decision-making time, optimizes the performance of the system as a whole and significantly contributes to the optimization of its energy efficiency is given.
Highlights
Electronic document management systems in today's realities, including pandemic and remote access to information resources are among the most demanded and critical in terms of security integrated security systems (ISS)
Assessment of the effectiveness of mechanisms for detecting threats to information leakage through parametric channels, in accordance with the above methodology, we will consider in relation to the typical characteristics of illegal actions to intercept information through the channels of the type under consideration and the typical characteristics of mechanisms for detecting threats to information leakage
The values of the characteristics of the information volume of the target function of illegal actions to intercept the secondary HF radiation of the elements of radio-electronic equipment (REE) and semi-active pawning devices (SAPD) and the target function of detecting threats of information leakage through parametric channels can determine the effectiveness of mechanisms to detect threats to information leakage through parametric channels, that is, the effectiveness has increased to 78%: E(в)
Summary
Electronic document management systems in today's realities, including pandemic and remote access to information resources are among the most demanded and critical in terms of security integrated security systems (ISS). This article proposes a comprehensive set of characteristics of such ISB, which allows to conduct research on the degree of protection of such systems from external and internal threats from the perspective of system analysis and to model their functioning in different conditions. Let us define a set of mathematical models to assess the characteristics of the effectiveness of response measures to threats of information leakage through parametric channels [1,2,3,4]
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have