RUS  ENG
Full version
JOURNALS // Informatics and Automation // Archive

Tr. SPIIRAN, 2019 Issue 18, volume 6, Pages 1301–1332 (Mi trspy1082)

This article is cited in 1 paper

Information Security

Methods of estimating reliability of information security systems which protect from unauthorized access in automated systems

O. I. Bokovaa, I. G. Drovnikovaa, A. S. Etepneva, E. A. Rogozina, V. A. Khvostovb

a Voronezh Institute of the Ministry of Interior
b Voronezh State University of Engineering Technologies

Abstract: Modern methods of protecting information  from unauthorized access in automated systems are based on the use of specialized information security systems from unauthorized access. Security systems are necessarily included in the form of additional software systems in the software as in a secure execution. Information security systems from unauthorized access can be developed not only in a process of automated systems design, but also complement the system-wide software of functioning systems. The use of the information security systems from unauthorized access can reduce a overall reliability of the automated systems, if they contain errors that are not detected during debugging. The reliability of the information security systems affects effectiveness of information security (confidentiality, integrity and availability). Guidelines of the Federal Service for Technical and Export Control (FSTEC) of Russia are a methodological basis for the formation of the information security systems’ image both in the process of development and in the process of modernization of the automated systems. The guidance documents of FSTEC of Russia do not contain methodological approaches to assessing the reliability of these program systems. In this regard, the actual design of techniques of estimating reliability of the information security systems from unauthorized access in automated systems in a secure execution. The structural complexity of the information security systems from unauthorized access and large number of functions performed necessitates the use of three reliability indicators that characterize the system in solving problems of confidentiality, integrity and availability of information. To develop the technique, the known methods of evaluating the reliability of complex systems are used, which do not allow their decomposition into serial and parallel connection. The developed methods were tested in assessing the reliability of the information security systems from unauthorized access with typical indicators of initial characteristics. The results of calculations and prospects of using the developed methods are presented in the paper.

Keywords: information security system, unauthorized access, automated system, reliability, refusal, information confidentiality, information integrity, information availability.

UDC: 004.056.53

Received: 13.06.2019

DOI: 10.15622/sp.2019.18.6.1301-1332



© Steklov Math. Inst. of RAS, 2024