Powered by OpenAIRE graph
Found an issue? Give us feedback

Структурное моделирование угроз информационной безопасности систем автоматизированного проектирования

Структурное моделирование угроз информационной безопасности систем автоматизированного проектирования

Abstract

The state of the art of aids for ensuring security of information systems is discussed. It is shown that since the Computer-Aided Design (CAD) system is a very specific information system, it is necessary also to develop specific models of its security threats. The fact that CAD is an open continuously varying system in which CALS technologies are applied is taken into account. The need is stressed for developing a unified methodology for creation of a threat model of the CAD information security (CAD IS), which allows the development of CAD IS subsystems to be approached from the common positions at different design institutions. It is shown that the CAD IS threat models must and can be equipped with an expert component enabling heuristics (that inevitably accompany the process of threat model formation for any information system) to be formalized.

Рассмотрено состояние современных средств обеспечения безопасности информационных систем. Показано, что поскольку САПР весьма специфичная информационная система, необходима разработка и специфичных моделей угроз ее безопасности. Учтено, что САПР — открытая, непрерывно меняющаяся система, в которой применяются CALS-технологии. Обращается внимание на необходимость разработки единой методологии создания модели угроз информационной безопасности САПР (ИБ САПР), позволяющей с единых позиций подходить к разработке подсистем ИБ САПР в различных проектных организациях. Показана необходимость и возможность снабжения моделей угроз ИБ САПР экспертной компонентой, позволяющей формализовать эвристики, неизбежно сопровождающие процесс формирования модели угроз любой информационной системы.

Keywords

МОДЕЛИ УГРОЗ, ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ САПР, УГРОЗА НЕСАНКЦИОНИРОВАННОГО ДОСТУПА, ВЕКТОР ЛОЖНЫХ ДАННЫХ, ВЕКТОР УТЕЧЕК, КОМБИНАЦИОННАЯ СХЕМА, ВЕРОЯТНОСТНЫЙ АВТОМАТ, НЕЧЕТКИЙ АВТОМАТ, НЕДЕТЕРМИНИРОВАННЫЙ АВТОМАТ, ДЕТЕРМИНИРОВАННЫЙ АВТОМАТ, КОМПОЗИЦИЯ АВТОМАТОВ

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
bronze