首页> 外文会议>Conference on Wave Electronics and its Application in Information and Telecommunication Systems >Analytical Model of Actions of the Information Security Violator on Covert Extraction of Confidential Information Processed on the Protected Object
【24h】

Analytical Model of Actions of the Information Security Violator on Covert Extraction of Confidential Information Processed on the Protected Object

机译:在受保护对象上处理机密信息的隐蔽提取的信息安全违规行为的分析模型

获取原文

摘要

The article describes an analytical model of the actions of an information security violator for the secret extraction of confidential information processed on the protected object in terms of the theory of Markov random processes. The characteristics of the existing models are given, as well as the requirements that are imposed on the model for simulating the process. All model states are described in detail, as well as the data flow that is used in the process simulation. The model is represented as a directed state graph. It also describes the option for evaluating the data obtained during modeling. In the modern world, with the developing methods and means of covert extraction of information, the problem of assessing the damage that can be caused by the theft of the organization's data is acute. This model can be used to build a model of information security threats.
机译:本文介绍了在Markov随机过程的理论中对受保护对象处理的机密信息秘密提取的信息安全违规行动的分析模型。 给出了现有模型的特性,以及在模拟过程中强加的要求。 所有模型状态都详细描述,以及在过程模拟中使用的数据流。 该模型表示为定向状态图。 它还描述了评估在建模期间获得的数据的选项。 在现代世界中,随着秘密提取信息的开发方法和手段,评估可能是由本组织数据盗窃造成的损害的问题是尖锐的。 该模型可用于构建信息安全威胁的模型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号