首页> 外文期刊>Procedia Computer Science >The Modeling Procedure of Illegal Entry into the Information System Based on the Logical Function of Disseminating Information on the Paths within the System
【24h】

The Modeling Procedure of Illegal Entry into the Information System Based on the Logical Function of Disseminating Information on the Paths within the System

机译:基于在系统内路径上传播信息的逻辑功能的非法进入信息系统的建模过程

获取原文
           

摘要

This article considers the problem of illegal entry into a certain information system and, in addition, the problem of illegal entry into the office of the Director. In the first case a distributed information management system (IMS) is considered, its block diagram is shown, the leak channels are shown, the numerical estimates for the probabilities of unauthorized access through these channels to the IMS are got, the average probability of “breaking” the IMS is calculated by raising the logical function of the movement information on the system. In addition, we studied the process of penetration of the attacker with unguarded areas inside the room where there is the head office containing information of interest to the attacker. We developed a graphic model of penetration of the malefactor in this study, which helped to calculate the rating for probability of penetration in this study, indirectly characterizing the damage from the penetration. On the proposed algorithms the probability of cracking (damage) of the different scenarios implemented by the attacker can be calculated. Therefore, the main purpose of the research results presented in this work is the presentation of an original algorithm in the General case, allowing to calculate in a certain way the average, that is equal to the probability of breaking the whole system, including “hacking” of each unit or transmission channels of information through the design of logical functions corresponding to each individual procedure, the unauthorized entry into any information system.
机译:本文考虑非法进入某个信息系统的问题,以及非法进入主任办公室的问题。在第一种情况下,考虑了分布式信息管理系统(IMS),显示了其框图,显示了泄漏通道,获得了对通过这些通道对IMS进行未经授权访问的概率的数值估计,“通过提高系统上运动信息的逻辑功能来计算“打破” IMS。此外,我们还研究了攻击者渗透到房间内部无人看管的区域的情况,在该区域中总公司包含攻击者感兴趣的信息。我们在此研究中开发了一个男性因素渗透的图形模型,该模型有助于计算该研究中渗透概率的等级,从而间接表征了渗透造成的损害。在提出的算法上,可以计算出攻击者实施的不同情况下的破解(损坏)概率。因此,这项工作的研究结果的主要目的是在一般情况下提出一种原始算法,允许以某种方式计算平均值,即等于破坏整个系统的概率,包括“黑客入侵”。通过设计对应于每个程序的逻辑功能的信息的每个单元或信息的传输通道,未经授权进入任何信息系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号