Berestov D. Methods of selecting project options for any information security system within any automated system established for departmental purposes on the basis of hierarchical models

Українська версія

Thesis for the degree of Candidate of Sciences (CSc)

State registration number

0416U001797

Applicant for

Specialization

  • 05.13.21 - Системи захисту інформації

17-03-2016

Specialized Academic Board

К 26.861.06

Essay

Object of study: the process of finding alternatives to the design of information security from unauthorized access. Objective: To enhance the security of automated systems by developing technology choice of design alternatives systems to protect information from unauthorized access. Subject of study: design alternative search method of information security from unauthorized access. Research methods: in solving problems in the thesis used methods of observation, comparison, theory of operations research, mathematical modeling, system analysis and multi evaluating alternatives. Theoretical and practical results and novelty: for the first time the mathematical model of the functional profile of information security department of the automated system, first proposed method of finding optimal design alternative systems to protect information from unauthorized access, getting new features functional profile of security, which is the ability to increase the beneficial effects in under resource constraints using fragmentation services security and detection zones indifference benefits. The results of dissertation research implemented: when grounding system requirements to protect information from unauthorized access; the election of a typical functional profile protection; the development of technical tasks for creating complex information security systems.

Files

Similar theses