Shestak Y. Methods and models of increasing the survivability of information systems based on the evaluation of external influences.

Українська версія

Thesis for the degree of Candidate of Sciences (CSc)

State registration number

0419U004566

Applicant for

Specialization

  • 05.13.06 - Інформаційні технології

10-10-2019

Specialized Academic Board

Д 26.001.51

Taras Shevchenko National University of Kyiv

Essay

The dissertation is devoted to increase and improvement of efficiency and durability of functioning of information security control systems developed on the basis of technology of models and methods for estimation of external influences of information systems. The complex analysis of tendencies of development of information system, as well as methods of management, administration and ensuring of stable work of constituent elements is carried out. The analysis showed the level of influence of information security processes on the stability and functional performance of these systems. The advantage of the information system over the centralized complexes was noted in terms of ensuring the security of the network infrastructure, the transmitted data and the procedures used in the software environment of the complex. The technology of estimating the protection of the modern information system from external influence is developed, which, unlike the existing ones, is constructed taking into account different directions of influence and a combination of complex protection mechanisms, the basis of which is the method of implementation of the distribution system of loading. Improved mechanisms for assessing the protection of the information system, which, in contrast to the existing ones, are oriented towards minimizing information losses, ensuring effective network monitoring, load distribution and model construction. This technique allows to increase the effectiveness of the information system from external influences. The technical simplicity of information systems expansion techniques and their scalability were pointed out. By duplicating the functions of multiple workstations, the information system can provide constant access to its resources and services, despite the temporary malfunctioning of individual components, meeting the requirements of availability, confidentiality of data, processes, technologies and functions. Achieving this goal is ensured by analyzing existing security methods; development of a set of methods in the information technology of assessing the survivability of IP; practical implementation of the developed methods of information technology of IP security assessment with a description of the result and calculation of characteristics that show the impact of different methods on the overall efficiency of protection of modern IP. The process of scientific search for ways to accomplish the tasks of this work is aimed at solving the global problem of ensuring the development of modern information systems, which are influenced by external and internal destabilizing factors. From the point of view of possibilities of obtaining scientifically valuable result in the process of research, it is envisaged to identify and characterize the mechanisms of ensuring the survivability of information systems, taking into account the problems of ensuring the survivability of modern IS, threats of activation of criminal goals and actualization of internal and external vulnerabilities of IP.

Files

Similar theses