Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ The scientific journ...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
versions View all 2 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

MODERN APPROACHES TO CLASSIFICATION OF THE SECURITY THREAT OF INFORMATION OF OBJECTS OF INFORMATION ACTIVITIES OF THE NATIONAL GUARD OF UKRAINE

СУЧАСНІ ПІДХОДИ ДО КЛАСИФІКАЦІЇ ЗАГРОЗ БЕЗПЕЦІ ІНФОРМАЦІЇ, ЯКА ЦИРКУЛЮЄ НА ОБ’ЄКТАХ ІНФОРМАЦІЙНОЇ ДІЯЛЬНОСТІ НАЦІОНАЛЬНОЇ ГВАРДІЇ УКРАЇНИ
Authors: V. Yelchenkov; O. Smyrnov;

MODERN APPROACHES TO CLASSIFICATION OF THE SECURITY THREAT OF INFORMATION OF OBJECTS OF INFORMATION ACTIVITIES OF THE NATIONAL GUARD OF UKRAINE

Abstract

The article provides a classification of violations of the properties of information that can be implemented with the help of an intruder in relation to the object of information activity of NSU. The most appropriate way to classify threats of all existing ones, specified in the article is the classification of threats based on the result of their influence on information, that is, a violation of its confidentiality, integrity, and availability of information. Information is kept confidential if the established rules for acquaintance with it are observed. Information maintains integrity if the established rules for its modification are observed. Information remains accessible if it remains possible to familiarize yourself with it or modify it in accordance with the established rules for a certain (small) period of time. A special place for determining the classification of each of the threats must be investigated, firstly, on the violation of what properties of information or ITS it is aimed at, secondly, the sources of the threat, and thirdly, possible ways to implement threats.It is known that information vulnerabilities can affect it not directly, but indirectly. Random threats of a subjective nature (actions carried out by staff or users through carelessness, negligence, ignorance, etc., but unintentionally) can be:– actions leading to the failure of ITS (individual components), the destruction of hardware, software, information resources (equipment, communication channels, deletion of data, programs, etc.)– unintentional damage to storage media;– unlawful change of the ITS operating modes (of individual components, equipment, software etc.), initiation of testing or technological processes that can lead to irreversible changes in the system (for example, formatting of storage media);– unintentional viral infection of software;– failure to comply with the requirements for organizational measures of protection of administrative documents in force in ITS;– errors when entering data into the system, outputting data to incorrect addresses of devices, internal and external subscribers, and the like;– any actions that may lead to the disclosure of confidential information, attributes of access control, loss of attributes, and the like;– unlawful implementation and use of software prohibited by the security policy (for example, training and game programs, system and application software, etc.)– the consequences of the incompetent use of protective equipment.The analysis and classification of threats to information security at an object of information activities and its circulation in ITS will simplify the process of compiling an information protection plan and increase the efficiency of its compilation at the information activity object in the information and telecommunication system.The article provides a general description of threats to information property violations.

Класифіковано порушення властивостей інформації, які можуть бути реалізовані з боку порушника стосовно об’єкта інформаційної діяльності Національної гвардії України. Проведено аналіз і класифікацію загроз безпеці інформації на об’єкти інформаційної діяльності та її циркуляції в інформаційно-телекомунікаційних системах, що дозволить спростити процес складання плану захисту інформації та підвищити ефективність його складання на об’єкті інформаційної діяльності та в інформаційно-телекомунікаційній системі. Запропоновано загальний опис загроз порушення властивостей інформації.

Keywords

комплексна система захисту інформації, спостережність, керованість, технічний захист інформації, загрози безпеці інформації, integrated information protection system, observability, controllability, technical information protection, information security threats

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
gold