Abstract
The article formalizes, creates and provides for consideration the concept of a single secure interference-resistant data transmission channel. In modern cybersecurity theory and practice, there is the NIST Cybersecurity Framework, which is a set of recommendations for reducing risks for organizations. In order for high-level data to be secure, there are requirements for the SIA triad, namely confidentiality, integrity and availability of information. Therefore, in the future, the expediency of the work and its result will directly depend on the satisfaction of the SIA conditions. As you know, high-level data: such as e-mail, visual data in the GUI of various applications, etc., are transmitted over low-level communication channels: such as cables, wireless radio communication channels, and others. At each of the levels for safe transmission of information, there are specific pests. At high levels, the main threat to information is man and the human factor. The lower the level of information transmission becomes, the more nature, natural obstacles and random short phenomena begin to influence. In order for the user to be able to use various devices without a threat to the confidentiality, integrity and availability of information, it is necessary to actively and continuously develop, improve and improve the existing methods of data protection, restoration, transmission and storage. Each aspect in this struggle for security is both an advantage and a disadvantage: excessive security is not appropriate for mass traffic, complexity does not always provide adequate security, and so on. Therefore, the optimality and expediency of the methods used becomes an important factor. For these reasons, the paper proposes a relatively simple, but no less effective approach to maintaining SIA requirements.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.