Abstract

This article describes one of the possible approaches to the implementation of a set of mechanisms and tools for assessing and monitoring software safety based on static and dynamic analysis of programs, which provides an effective check of the operating and developed software. To solve this problem, it is proposed to use mathematical models of program circuits, modern software development technologies and methods of software analysis.

Highlights

  • The importance of such a study is based on the direct dependence of the operability of the functioning of the IS on the qualitative indicators of the reliability and safety of the software used

  • We can conclude that such a property of reliability as the operability of an information system has nothing to do with security

  • The model distinguishes two groups of processes - normal and related to the security core. The former perform the functional tasks of the information system, while the latter ensure the security of the processed information

Read more

Summary

Research problem statement

The aggregate component of the reliability of modern information systems, especially those focused on the control function, includes both the reliability of the software and the reliability of the technical means for supporting the computing process [2,9]. It is obvious that the reliable functioning of various information systems, including analytical, intellectual and expert IS, is based precisely on their software component The reasons for this conclusion are, on the one hand, their complex software implementation and, on the other hand, the use of foreign development software that did not pass the certification process for the presence of software backlogs. All this dictates the need to control the quality parameters of software, especially for those information systems that provide vital functions for managing both people and complex technical equipment. The following assumptions were made: - the hardware architecture follows the von Neumann architecture; - source codes of programs are written in procedural or object-oriented high-level languages

Information process model
Information Threat Model
Software Vulnerability Model
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.