Skip to main content

Optimization of Technical Information Protection System’s Composition

  • Conference paper
  • First Online:
Book cover Creativity in Intelligent Technologies and Data Science (CIT&DS 2019)

Abstract

Technical means of protection is used to protect sensitive information when hardware and software protection is insufficient or not applicable. Technical information protection system is a complex multi-component system. The effectiveness of the protection system is determined by the effect it achieves, taking into account the financial resources spent. In most cases, the composition of the protection system is regulated by regulations. However, you can select different security means for a particular information security subsystem. Each means is evaluated by its quality indicators. For the information protection system an integral indicator of quality is formed taking into account the private indicators of the means of protection. It is proposed to use the method of obtaining a Bayesian evaluation to obtain an integral indicator of the quality of the protection system. This method reduces the accuracy requirements, as well as naturally reveals the inconsistency of estimates of particular indicators of the quality of protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Grishachev, V., Kalinina, Y., Kazarin, O.: Fiber-optic channel of voice information leakage. In: Proceedings of the 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2019, pp. 1512–1514 (2019)

    Google Scholar 

  2. Drago, A., Marrone, S., Mazzocca, N., Nardone, R., Tedesco, A., Vittorini, V.: A model-driven approach for vulnerability evaluation of modern physical protection systems. Softw. Syst. Model. 18(1), 523–556 (2019)

    Article  Google Scholar 

  3. Zou, B., et al.: Evaluation of vulnerable path: using heuristic path-finding algorithm in physical protection system of nuclear power plant. Int. J. Crit. Infrastruct. Prot. 23, 90–99 (2018)

    Article  Google Scholar 

  4. Peng, H.-F., Huang, Z.-Q., Liu, L.-Y., Li, Y., Ke, C.-B.: Static analysis method of secure privacy information flow for service composition. Ruan Jian Xue Bao/J. Softw. 29(6), 1739–1755 (2018)

    MathSciNet  Google Scholar 

  5. Wang, D., Xu, Y., Xu, P.: Information system’s security evaluation of dynamic behavior based on service composition. In: Proceedings - The 2015 10th International Conference on Intelligent Systems and Knowledge Engineering, ISKE 2015, pp. 112–120 (2016)

    Google Scholar 

  6. Akhmetov, B., Lakhno, V., Akhmetov, B., Myakuhin, Y., Adranova, A., Kydyralina, L.: Models and algorithms of vector optimization in selecting security measures for higher education institution’s information learning environment. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds.) CoMeSySo 2018. AISC, vol. 860, pp. 135–142. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-00184-1_13

    Chapter  Google Scholar 

  7. Burakov, D.P., Kozhomberdieva, G.I.: Comparison of approaches to obtain integral estimation of software quality according to ISO/IEC 9126 standard. In: Information Technologies in Science, Management, Social Sphere and Medicine, pp. 221–226 (2018)

    Google Scholar 

  8. Koskin, A., Uzharinskiy, A., Averchenkov, A., Ivkina, N., Rytov, M.: Mechanisms for the construction of the service-oriented information system of educational institution based on technologies of data integration and virtualization. In: Kravets, A., Shcherbakov, M., Kultsova, M., Groumpos, P. (eds.) CIT&DS 2017. CCIS, vol. 754, pp. 177–186. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-65551-2_13

    Chapter  Google Scholar 

  9. Kvyatkovskaya, I.Yu., Kosmacheva, I., Sibikina, I., Galimova, L., Rudenko, M., Barabanova, E.A.: Modular structure of data processing in automated systems of risk management in the fisheries industry. In: Kravets, A., Shcherbakov, M., Kultsova, M., Groumpos, P. (eds.) CIT&DS 2017. CCIS, vol. 754, pp. 284–301. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-65551-2_21

    Chapter  Google Scholar 

  10. Kultsova, M., Litovkin, D., Zhukova, I., Dvoryankin, A.: Intelligent support of decision making in management of large-scale systems using case-based, rule-based and qualitative reasoning over ontologies. In: Kravets, A., Shcherbakov, M., Kultsova, M., Groumpos, P. (eds.) CIT&DS 2017. CCIS, vol. 754, pp. 331–349. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-65551-2_24

    Chapter  Google Scholar 

Download references

Acknowledgment

The reported study was funded by the Council for grants of Russian Federation President, according to the research project No. MК-6404.2018.9.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arina Nikishova .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nikishova, A., Umnitsyn, Y., Umnitsyn, M., Omelchenko, T. (2019). Optimization of Technical Information Protection System’s Composition. In: Kravets, A., Groumpos, P., Shcherbakov, M., Kultsova, M. (eds) Creativity in Intelligent Technologies and Data Science. CIT&DS 2019. Communications in Computer and Information Science, vol 1084. Springer, Cham. https://doi.org/10.1007/978-3-030-29750-3_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-29750-3_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-29749-7

  • Online ISBN: 978-3-030-29750-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics