Abstract
The results of researches, allowing raising the level of protection of the automated data processing systems of critical applications and intellectual information systems of enterprises are presented in the article. The mathematical models and results of vulnerability estimation of information systems which have Internet connection through various communication channels are resulted in this work. The system approach to solving problems of information security, proposed in this work provides for the integration of mathematical models of the processing and protection of information. The method of modeling the security policy to provide a highly reliable information processing has been developed. The mathematical models of synthesis of policy safe interaction of information processes, allowing security policy to consider separately the various structural components of network with the ability to its further interlinkages have been developed. Using the new mathematical models of flexible reliability, availability, confidentiality and integrity of information processed, allowing mathematically describe the mechanisms to ensure the availability and confidentiality of the information and take into account the quantitative requirements for data integrity.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.