首页 > 最新文献

Voprosy kiberbezopasnosti最新文献

英文 中文
SPEECH-LIKE INTERFERENCE RESISTANT TO NOISE REDUCTION METHODS AS A RESULT OF SCRAMBLING OF THE PROTECTED SPEECH 类语音干扰由于被保护语音的置乱而抵抗降噪方法
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-5-14-27
S. Dvoryankin, Nikita S. Dvoryankin, Roman A. Ustinov
The aim of this article is to study the possibility of creating a speech-like interference (SLI) based on scrambling of the protected speech signal that is resistant to noise cleaning, restoration and reconstruction of distorted speech through processing of its spectrogram images, including the use of the speaker’s voice database. Methods: applied systems analysis, digital spectral-time analysis, digital processing of signals and images, image analysis of sonograms Results: it is proposed to use as the main indicator of the security of speech information the concept of potential speech intelligibility, methods for assessing potential intelligibility are determined. An algorithm of compensationtype digital noise cleaning using image analysis-synthesis technology has been developed. The requirements for the created SLI are formed, consisting in changing the spetral-temporal envelope of speech, removing («weakening») traces of the harmonic structure of speech, equalizing the capacities of the protected speech signal and the SLI masking it. The approaches to the formation of an SLI resistant to the procedures of digital noise cleaning and reconstruction of distorted sonograms are described, proposals are presented on the methodology for evaluating the effectiveness of interference through the indicator of potential intelligibility. The results obtained will allow to better understand the work of attacking tools, develop methods and means of effectively countering possible threats, and expand the capabilities of existing speech information protection systems. The scientific novelty consists in the development of criteria for evaluating the effectiveness of speech-like interference, taking into account the capabilities of the intruder to restore the intelligibility of distorted speech messages, proposed methods for the formation of scrambler-type SLI that meet such criteria, substantiated proposals to improve existing methods for assessing and monitoring the security of speech information from its leakage through technical channels.
本文的目的是研究基于对受保护的语音信号进行置乱来创建类语音干扰(SLI)的可能性,这种干扰可以抵抗噪声,通过处理其频谱图图像来恢复和重建失真语音,包括使用说话人的语音数据库。方法:应用系统分析、数字频谱时间分析、信号和图像的数字处理、超声图像的图像分析。结果:提出以潜在语音可理解度的概念作为语音信息安全性的主要指标,确定了评估潜在语音可理解度的方法。提出了一种基于图像分析合成技术的补偿型数字噪声清除算法。创建SLI的要求是形成的,包括改变语音的频谱-时间包络,去除(“削弱”)语音谐波结构的痕迹,平衡受保护的语音信号和SLI屏蔽它的容量。本文描述了形成抵抗数字噪声清除和畸变超声图重建程序的SLI的方法,并就通过潜在可理解性指标评估干扰有效性的方法提出了建议。研究结果将有助我们更了解攻击工具的工作原理,发展有效对抗可能威胁的方法和手段,并扩展现有的语音信息保护系统的能力。科学的新颖性在于制定了评估类语音干扰有效性的标准,考虑到入侵者恢复扭曲语音信息的可理解性的能力,提出了形成符合这些标准的扰频器类型SLI的方法,提出了改进现有方法的建议,以评估和监测通过技术渠道泄漏的语音信息的安全性。
{"title":"SPEECH-LIKE INTERFERENCE RESISTANT TO NOISE REDUCTION METHODS AS A RESULT OF SCRAMBLING OF THE PROTECTED SPEECH","authors":"S. Dvoryankin, Nikita S. Dvoryankin, Roman A. Ustinov","doi":"10.21681/2311-3456-2022-5-14-27","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-5-14-27","url":null,"abstract":"The aim of this article is to study the possibility of creating a speech-like interference (SLI) based on scrambling of the protected speech signal that is resistant to noise cleaning, restoration and reconstruction of distorted speech through processing of its spectrogram images, including the use of the speaker’s voice database. Methods: applied systems analysis, digital spectral-time analysis, digital processing of signals and images, image analysis of sonograms Results: it is proposed to use as the main indicator of the security of speech information the concept of potential speech intelligibility, methods for assessing potential intelligibility are determined. An algorithm of compensationtype digital noise cleaning using image analysis-synthesis technology has been developed. The requirements for the created SLI are formed, consisting in changing the spetral-temporal envelope of speech, removing («weakening») traces of the harmonic structure of speech, equalizing the capacities of the protected speech signal and the SLI masking it. The approaches to the formation of an SLI resistant to the procedures of digital noise cleaning and reconstruction of distorted sonograms are described, proposals are presented on the methodology for evaluating the effectiveness of interference through the indicator of potential intelligibility. The results obtained will allow to better understand the work of attacking tools, develop methods and means of effectively countering possible threats, and expand the capabilities of existing speech information protection systems. The scientific novelty consists in the development of criteria for evaluating the effectiveness of speech-like interference, taking into account the capabilities of the intruder to restore the intelligibility of distorted speech messages, proposed methods for the formation of scrambler-type SLI that meet such criteria, substantiated proposals to improve existing methods for assessing and monitoring the security of speech information from its leakage through technical channels.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116224932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finger Vein Recognition Technique 手指静脉识别技术
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-5-51-56
A. Grizhebovskaya, Alexander Mikhalev
{"title":"Finger Vein Recognition Technique","authors":"A. Grizhebovskaya, Alexander Mikhalev","doi":"10.21681/2311-3456-2019-5-51-56","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-5-51-56","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124375430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Features of Licensing the Activities of Enterprises and Organizations in the Interests of the Ministries of Defense of the Russian Federation 为俄罗斯联邦国防部的利益对企业和组织的活动进行许可的特点
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-5-63-74
A. Ivanov, Ivan Sprogis, Igor Shahalov
The purpose of the article: the best of the existing procedure for assessing the conformity of organizations, industrial enterprises and institutions - developers of software and hardware complexes used in weapons and military equipment. Research methods: system analysis, development of methods. Result: draft methods for checking the archive during special examinations of enterprises and organizations - applicants for a license of the Ministry of Defense of Russia for activities to create information security tools and verify the compliance of software development processes with the requirements of GOST R 56939-2016 during a special examination of licensees of the Ministry of Defense of Russia in the field of creating information security tools have been developed.
这篇文章的目的是:最好地利用现有程序来评估组织、工业企业和机构- -武器和军事装备中使用的软件和硬件综合体的开发商- -的一致性。研究方法:系统分析、开发方法。结果:制定了在对企业和组织进行特殊检查期间检查档案的方法草案-俄罗斯国防部许可申请人创建信息安全工具的活动,并在对俄罗斯国防部被许可人进行特殊检查期间验证软件开发过程是否符合GOST R 56939-2016的要求。
{"title":"Features of Licensing the Activities of Enterprises and Organizations in the Interests of the Ministries of Defense of the Russian Federation","authors":"A. Ivanov, Ivan Sprogis, Igor Shahalov","doi":"10.21681/2311-3456-2021-5-63-74","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-63-74","url":null,"abstract":"The purpose of the article: the best of the existing procedure for assessing the conformity of organizations, industrial enterprises and institutions - developers of software and hardware complexes used in weapons and military equipment. Research methods: system analysis, development of methods. Result: draft methods for checking the archive during special examinations of enterprises and organizations - applicants for a license of the Ministry of Defense of Russia for activities to create information security tools and verify the compliance of software development processes with the requirements of GOST R 56939-2016 during a special examination of licensees of the Ministry of Defense of Russia in the field of creating information security tools have been developed.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125999272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ON PRIMARY TECHNICAL DEVICES AND REQUIREMENTS FOR QUANTUM SYSTEM SECURITY KEYS 论量子系统安全密钥的主要技术装置和要求
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-2-65-72
V. Averyanov, Igor Kartsan
Purpose of the article: development of new methods, algorithms and models to detect unauthorized actions of an intruder/s in relation to broadcast data represented in the form of one-photon pure states of light particles, which will allow: to strengthen the secrecy of basic security keys, improve procedures for data exchange and processing by legitimate users of the telecommunications system, expand the functionality of existing technological solutions in their classic representation. Research method: system analysis, information security assessment method. The result: risks of critical system errors for procedures of basic states measurement results matching and supposed potential possibilities of attacker to realize vulnerabilities through active phase of attacks with explicit critical outcome are presented. It is established that translation of mixed single-photon states and imposition on receiving hardware is explicitly uncontrolled, unaccountable and not contained in any algorithm of quantum protocols, which, according to the authors, is the most critical vulnerability of modern cryptographic systems based on quantum mechanics. A way to solve problems of “silent” scanning and to counteract hidden active attacks on quantum channel and particle states is proposed. The essence of the solution consists in non-orthogonality of states of a random basis vector and duplication of a main communication channel containing an information path on pulse signals broadcasting, where a known number of synchro-sentences in a backup line allows to trace an attacker. Fundamental is the knowledge of the primary-natural errors occurring at each of the stages of the formation of the main security key.
本文的目的:开发新的方法、算法和模型,以检测与以光粒子的单光子纯态形式表示的广播数据有关的入侵者的未经授权的行为,这将允许:加强基本安全密钥的保密性,改进电信系统合法用户的数据交换和处理程序,扩展现有技术解决方案在其经典表示中的功能。研究方法:系统分析法、信息安全评估法。结果:给出了基本状态测量结果匹配过程的关键系统错误风险,以及攻击者通过具有明确关键结果的攻击活动阶段实现漏洞的假定潜在可能性。本文确定了混合单光子态的转换和对接收硬件的施加是不受控制的、不可解释的,并且不包含在任何量子协议算法中,这是基于量子力学的现代密码系统最关键的漏洞。提出了一种解决“静默”扫描问题的方法,并抵消了对量子信道和粒子态的隐藏主动攻击。该解决方案的本质在于随机基向量状态的非正交性和包含脉冲信号广播信息路径的主通信信道的复制,其中备份线路中已知数量的同步语句允许跟踪攻击者。基础知识是对主安全密钥形成的每个阶段发生的主要自然错误的了解。
{"title":"ON PRIMARY TECHNICAL DEVICES AND REQUIREMENTS FOR QUANTUM SYSTEM SECURITY KEYS","authors":"V. Averyanov, Igor Kartsan","doi":"10.21681/2311-3456-2023-2-65-72","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-2-65-72","url":null,"abstract":"Purpose of the article: development of new methods, algorithms and models to detect unauthorized actions of an intruder/s in relation to broadcast data represented in the form of one-photon pure states of light particles, which will allow: to strengthen the secrecy of basic security keys, improve procedures for data exchange and processing by legitimate users of the telecommunications system, expand the functionality of existing technological solutions in their classic representation. Research method: system analysis, information security assessment method. The result: risks of critical system errors for procedures of basic states measurement results matching and supposed potential possibilities of attacker to realize vulnerabilities through active phase of attacks with explicit critical outcome are presented. It is established that translation of mixed single-photon states and imposition on receiving hardware is explicitly uncontrolled, unaccountable and not contained in any algorithm of quantum protocols, which, according to the authors, is the most critical vulnerability of modern cryptographic systems based on quantum mechanics. A way to solve problems of “silent” scanning and to counteract hidden active attacks on quantum channel and particle states is proposed. The essence of the solution consists in non-orthogonality of states of a random basis vector and duplication of a main communication channel containing an information path on pulse signals broadcasting, where a known number of synchro-sentences in a backup line allows to trace an attacker. Fundamental is the knowledge of the primary-natural errors occurring at each of the stages of the formation of the main security key.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132008671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods of Dynamic Critical Path Monitoring for Better Performance and Power Efficiency in VLSI-Circuits 动态关键路径监测方法提高vlsi电路的性能和功率效率
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-4-35-45
Ilya Peplov, L. Eisymont
{"title":"Methods of Dynamic Critical Path Monitoring for Better Performance and Power Efficiency in VLSI-Circuits","authors":"Ilya Peplov, L. Eisymont","doi":"10.21681/2311-3456-2019-4-35-45","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-35-45","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133552574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Digital Fingerprint Evolution on the Authenticity of Anonymous User Identification 数字指纹演化对匿名用户身份真实性的影响
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-2-72-86
O. Sheluhin, Anna Vanyushina, Alexander S. Bolshakov, Maksim Zhelnov
Purpose of work – is to evaluate the effectiveness of software identification of anonymous users in the context of the evolution of digital fingerprints on their devices. Research method. Artificial intelligence technologies, including NLP (Natural Language Processing), methods of LSA (Latent semantic analysis), as well as methods of clustering and machine learning. Objects of study are theoretical and practical issues of solving and visualizing information security problems. Results of the study. To study the impact of the evolution of digital fingerprints of analyzed devices, by alternately changing the analyzed parameters of the original fingerprint (a digital fingerprint of a browser or digital device), a database of modified fingerprints was created. A calculation technique is proposed and numerical results are presented for estimating the probability of correct and false user identifications during the evolution of the attributes of digital fingerprints. The dependence of the effectiveness of user deanonymization depending on the characteristics and properties of the variable attributes of digital fingerprints of his devices is shown. Practical relevance relevance. To improve the efficiency of anonymous user identification systems based on the analysis of device digital fingerprints. The proposed article will be useful both to specialists developing information security systems and to students studying “Information Security” course.
工作目的-评估匿名用户的软件识别在其设备上的数字指纹演变的背景下的有效性。研究方法。人工智能技术,包括NLP(自然语言处理),LSA(潜在语义分析)方法,以及聚类和机器学习方法。研究对象是解决和可视化信息安全问题的理论和实践问题。研究结果。为了研究被分析设备数字指纹演化的影响,通过交替改变原始指纹(浏览器或数字设备的数字指纹)的被分析参数,创建修改后的指纹数据库。提出了一种用于估计数字指纹属性演化过程中用户识别正误概率的计算方法,并给出了数值结果。显示了用户去匿名化的有效性依赖于其设备的数字指纹的可变属性的特征和属性。实用的相关性。为了提高基于设备数字指纹分析的匿名用户身份识别系统的效率。建议的文章将是有用的专家开发信息安全系统和学生学习“信息安全”课程。
{"title":"The Impact of Digital Fingerprint Evolution on the Authenticity of Anonymous User Identification","authors":"O. Sheluhin, Anna Vanyushina, Alexander S. Bolshakov, Maksim Zhelnov","doi":"10.21681/2311-3456-2022-2-72-86","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-2-72-86","url":null,"abstract":"Purpose of work – is to evaluate the effectiveness of software identification of anonymous users in the context of the evolution of digital fingerprints on their devices. Research method. Artificial intelligence technologies, including NLP (Natural Language Processing), methods of LSA (Latent semantic analysis), as well as methods of clustering and machine learning. Objects of study are theoretical and practical issues of solving and visualizing information security problems. Results of the study. To study the impact of the evolution of digital fingerprints of analyzed devices, by alternately changing the analyzed parameters of the original fingerprint (a digital fingerprint of a browser or digital device), a database of modified fingerprints was created. A calculation technique is proposed and numerical results are presented for estimating the probability of correct and false user identifications during the evolution of the attributes of digital fingerprints. The dependence of the effectiveness of user deanonymization depending on the characteristics and properties of the variable attributes of digital fingerprints of his devices is shown. Practical relevance relevance. To improve the efficiency of anonymous user identification systems based on the analysis of device digital fingerprints. The proposed article will be useful both to specialists developing information security systems and to students studying “Information Security” course.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131494884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Status and Prospects of Development Methodological Support for Technical Protection of Information in Information systems 信息系统信息技术保护方法支持的现状与展望
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-1-41-57
S. Soloviev, Mikhail Tarelkin, Vasily Tekunov, Yuri Yazov
The goal of article is determine the main areas for development, composition and structure of prospective methodological support for the organization and maintenance of technical protection of information in information systems.The method of research: is summary and analysis the existing methodological support for organization and maintenance of the technical protection of information from unauthorized access and its development trends in the interests of the conversion from qualitative to quantitative procedures of substantiation requirements and selection process to build information security system in information systems. The result of the research: The factors defining the need to develop methodological support for the organization and maintenance of technical protection of information have been identified, including subject area extension of information protection, the need to move to quantitative research methods, algorithms and procedures for assessment the possibilities of implementing information security threats, the need to justify the requirements for technical protection of information and select protection measures and means. Data volume has increased dramatically and processes of information gathering and analysis are impossible without the use of corresponding special software tools and complexes. The composition and structure of prospective methodological support have been developed, including using modern methods of artificial intelligence theory (machine learning, artificial neural networks (ANNs)), the apparatus of composite Petri-Markov nets, risk theory, etc., for the tasks of categorizing the information systems and the information processed in them, identifying information security threats and vulnerabilities, as well as threat risk assessment considering time factor. It was noted that the introduction of such support into practice is impossible without the creation of software systems that automate categorization processes, quantitative risk assessments of implementing threats and building information protection systems. Scientific novelty: a systematic idea of the composition, structure and prospects of development methodological support has been identified for the organization and maintenance of technical protection of information to solve problems of categorizing the information systems and the information processed in them, forecasting, assessment the possibilities and consequences of implementing information security threats. Author contributions: Soloviev S.V. - assessment of the status and research of the prospects of development methodological support for the categorization the information system and the information processed in them; Tarelkin M.A. - study of methods of threats forecasting for information security and their prospective applications in the management of the Data Bank of information security threats of FSTEC of Russia; V.V. Tekunov - ways to build a promising system for threat forecasting to informa
本文的目标是确定为组织和维持信息系统中的信息技术保护提供前瞻性方法支持的发展、组成和结构的主要领域。研究的方法:是总结和分析现有的方法支持组织和维护的技术保护信息免受未经授权的访问及其发展趋势的利益从定性到定量的转换程序的实质要求和选择过程,以建立信息系统中的信息安全体系。研究结果:确定了需要为组织和维护信息技术保护制定方法支持的因素,包括信息保护的主题领域扩展,转向定量研究方法、算法和程序以评估实施信息安全威胁的可能性的需要,证明信息技术保护要求的必要性以及选择保护措施和手段的需要。数据量急剧增加,如果不使用相应的特殊软件工具和复合物,信息收集和分析过程是不可能的。发展了前瞻性方法学支持的组成和结构,包括使用人工智能理论(机器学习、人工神经网络(ann))、复合Petri-Markov网络装置、风险理论等现代方法,对信息系统及其处理的信息进行分类,识别信息安全威胁和漏洞,以及考虑时间因素的威胁风险评估。有人指出,如果不建立软件系统,使分类过程自动化、对实施威胁进行定量风险评估和建立信息保护系统,就不可能将这种支助付诸实施。科学新颖性:对信息技术保护的组成、结构和发展前景的系统思想,确定了组织和维护信息技术保护的方法支持,以解决对信息系统及其处理的信息进行分类、预测、评估实施信息安全威胁的可能性和后果等问题。作者贡献:索洛维耶夫S.V. -现状评估与发展前景研究:信息系统分类及其处理信息的方法支持;Tarelkin硕士-研究信息安全威胁预测方法及其在俄罗斯FSTEC信息安全威胁数据库管理中的应用前景;V.V. Tekunov -基于互联网上有关威胁的监测出版物结果建立一个有前途的信息安全威胁预测系统的方法;Yazov Yu.K。-对实施信息安全威胁的风险评估的一般指导、状态评估和发展前景的方法支持。
{"title":"Status and Prospects of Development Methodological Support for Technical Protection of Information in Information systems","authors":"S. Soloviev, Mikhail Tarelkin, Vasily Tekunov, Yuri Yazov","doi":"10.21681/2311-3456-2023-1-41-57","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-41-57","url":null,"abstract":"The goal of article is determine the main areas for development, composition and structure of prospective methodological support for the organization and maintenance of technical protection of information in information systems.The method of research: is summary and analysis the existing methodological support for organization and maintenance of the technical protection of information from unauthorized access and its development trends in the interests of the conversion from qualitative to quantitative procedures of substantiation requirements and selection process to build information security system in information systems. The result of the research: The factors defining the need to develop methodological support for the organization and maintenance of technical protection of information have been identified, including subject area extension of information protection, the need to move to quantitative research methods, algorithms and procedures for assessment the possibilities of implementing information security threats, the need to justify the requirements for technical protection of information and select protection measures and means. Data volume has increased dramatically and processes of information gathering and analysis are impossible without the use of corresponding special software tools and complexes. The composition and structure of prospective methodological support have been developed, including using modern methods of artificial intelligence theory (machine learning, artificial neural networks (ANNs)), the apparatus of composite Petri-Markov nets, risk theory, etc., for the tasks of categorizing the information systems and the information processed in them, identifying information security threats and vulnerabilities, as well as threat risk assessment considering time factor. It was noted that the introduction of such support into practice is impossible without the creation of software systems that automate categorization processes, quantitative risk assessments of implementing threats and building information protection systems. Scientific novelty: a systematic idea of the composition, structure and prospects of development methodological support has been identified for the organization and maintenance of technical protection of information to solve problems of categorizing the information systems and the information processed in them, forecasting, assessment the possibilities and consequences of implementing information security threats. Author contributions: Soloviev S.V. - assessment of the status and research of the prospects of development methodological support for the categorization the information system and the information processed in them; Tarelkin M.A. - study of methods of threats forecasting for information security and their prospective applications in the management of the Data Bank of information security threats of FSTEC of Russia; V.V. Tekunov - ways to build a promising system for threat forecasting to informa","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"598 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134435322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Increasing the Security of Information from Leakage Through Side Electromagnetic Emissions 通过侧电磁发射增加信息泄漏的安全性
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-3-82-89
A. Parshutkin, Marina Neaskina
The purpose of the article: development of software-implemented ways to increase the security of information from leakage through spurious electromagnetic radiation of a DVI video system. Research method: search for brightness gradations of RGB primary colors that form similar levels of spurious electromagnetic radiation by enumeration of experimental data obtained from fragments of the reconstructed image. Results: the first part of the article provides a review and analysis of the literature on the features of the functioning of the video interface of the DVI standard. The main characteristics of the TMDS coding algorithm, which can affect the parameters of spurious electromagnetic radiation of the video interface of modern computer technology, are considered. The second part of the article presents an experimental setup for analyzing the relationship between the visual contrast of an image and changes in the intensity of electromagnetic spurious emissions from a DVI video system. On the basis of an experimental comparison of the intensity values of side electromagnetic radiation for different color shades specified by RGB combinations, the possibility of using such pairs of color tone combinations that, on the one hand, are acceptable for the perception of information by the operator, and, on the other hand, have practically indistinguishable levels of side effects, is shown. electromagnetic radiation. The third part of the article (this is for the existing one) presents a method developed by the authors to increase the security of information from leakage through spurious electromagnetic radiation of a DVI video system. The possibility of implementing the proposed method for reducing the information content of spurious electromagnetic radiation of a video system when displaying two-color images is shown.
本文的目的是:开发软件实现的方法来提高DVI视频系统的信息安全性,防止虚假电磁辐射泄漏。研究方法:通过对重构图像碎片实验数据的列举,寻找形成相似伪电磁辐射水平的RGB原色的亮度等级。结果:文章的第一部分对DVI标准视频接口功能特点的文献进行了回顾和分析。分析了影响现代计算机视频接口杂散电磁辐射参数的TMDS编码算法的主要特点。文章的第二部分提出了一个实验装置,用于分析图像的视觉对比度与DVI视频系统的电磁杂散发射强度变化之间的关系。在对RGB组合所指定的不同色度的侧电磁辐射强度值进行实验比较的基础上,显示了使用这样的色调组合对的可能性,一方面,操作员对信息的感知是可以接受的,另一方面,具有几乎无法区分的副作用水平。电磁辐射。文章的第三部分(这是针对现有的部分)介绍了作者开发的一种方法,以提高DVI视频系统通过虚假电磁辐射泄漏信息的安全性。展示了在显示双色图像时实现所提出的减少视频系统的伪电磁辐射信息含量的方法的可能性。
{"title":"Increasing the Security of Information from Leakage Through Side Electromagnetic Emissions","authors":"A. Parshutkin, Marina Neaskina","doi":"10.21681/2311-3456-2022-3-82-89","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-3-82-89","url":null,"abstract":"The purpose of the article: development of software-implemented ways to increase the security of information from leakage through spurious electromagnetic radiation of a DVI video system. Research method: search for brightness gradations of RGB primary colors that form similar levels of spurious electromagnetic radiation by enumeration of experimental data obtained from fragments of the reconstructed image. Results: the first part of the article provides a review and analysis of the literature on the features of the functioning of the video interface of the DVI standard. The main characteristics of the TMDS coding algorithm, which can affect the parameters of spurious electromagnetic radiation of the video interface of modern computer technology, are considered. The second part of the article presents an experimental setup for analyzing the relationship between the visual contrast of an image and changes in the intensity of electromagnetic spurious emissions from a DVI video system. On the basis of an experimental comparison of the intensity values of side electromagnetic radiation for different color shades specified by RGB combinations, the possibility of using such pairs of color tone combinations that, on the one hand, are acceptable for the perception of information by the operator, and, on the other hand, have practically indistinguishable levels of side effects, is shown. electromagnetic radiation. The third part of the article (this is for the existing one) presents a method developed by the authors to increase the security of information from leakage through spurious electromagnetic radiation of a DVI video system. The possibility of implementing the proposed method for reducing the information content of spurious electromagnetic radiation of a video system when displaying two-color images is shown.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133846320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Architecture of Reconfigurable Heterogeneous Distributed Supercomputer System for Solving Problems of Intelligent Data Processing in the Era of Digital Transformation of the Economy 解决经济数字化转型时代智能数据处理问题的可重构异构分布式超级计算机体系结构
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-5-02-11
I. Kalyaev, A. Antonov, V. Zaborovsky
{"title":"Architecture of Reconfigurable Heterogeneous Distributed Supercomputer System for Solving Problems of Intelligent Data Processing in the Era of Digital Transformation of the Economy","authors":"I. Kalyaev, A. Antonov, V. Zaborovsky","doi":"10.21681/2311-3456-2019-5-02-11","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-5-02-11","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124198851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the Evaluation of the Effectiveness Information Protection in Electronic Document Management Systems 电子文档管理系统信息保护有效性评价研究
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-1-25-34
Yuri Yazov, Export Control, O. Avsentyev, I. Rubtsova, Law
{"title":"On the Evaluation of the Effectiveness Information Protection in Electronic Document Management Systems","authors":"Yuri Yazov, Export Control, O. Avsentyev, I. Rubtsova, Law","doi":"10.21681/2311-3456-2019-1-25-34","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-1-25-34","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115965267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Voprosy kiberbezopasnosti
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1