Iuliia K. Vulnerability assessment methods and methods of information systems optimization in the context of information impacts

Українська версія

Thesis for the degree of Candidate of Sciences (CSc)

State registration number

0415U003474

Applicant for

Specialization

  • 05.13.21 - Системи захисту інформації

28-05-2015

Specialized Academic Board

Д 26.062.17

National Aviation University

Essay

In work presented the differential-game method for information systems parameter optimization, by taking into account influence player strategies, resource optimization criteria players during optimization and energy component in a given period of time, allows to determine in real time the optimal strategy for information security in information systems. Was further developed system of rules for modeling criteria of the optimality, which, through morphological synthesis method, separable additive criteria and limits, can solve the problem of analysis, synthesis and optimization for systems by selected criteria and highlighted limits, and evaluate the level of information systems security based on permitted boundaries guaranteed data security level. In addition, further developed the optimization information security method, by taking into account security settings (security tools number, security subsystem type, overall resource security and information value) allows to determine the optimal behavior in "influence-security" system. Also improved method of finding the optimal configuration for information system, which, through the use of graph-theoretic modeling reverse construct the optimal source tree allows to define the optimum information systems architecture in the information influences conditions.

Files

Similar theses