Abstract

This article describes the task of building effective solutions to increase the level of cyber security of state-level information systems in the conditions of weapons of aggression and powerful cyber attacks on critical infrastructure. A descriptive supplement to the security threat model has been developed, taking into account the concept of Zero Trust, and the threat model has been visualized, which allows you to determine the potential vulnerabilities of existing solutions regarding the construction of identification and access control subsystems. Requirements for contactless authentication hardware are defined. A functional diagram of the interaction of radio frequency identification components with passive electrical oscillating circuits has been built. A block diagram has been created algorithm of the identification system to the hardware authentication device. Defined functional and engineering solutions for the construction of contactless hardware authentication of clients during access to system devices. Grounded sketch decisions regarding the construction of a steganographic data exchange protocol in identification and access management procedures.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call