Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-4-02-12
A. Adamov, D. Fomin, L. Eisymont
{"title":"Main Problem Directions in the Field of Domestic Element Base of Supercomputers","authors":"A. Adamov, D. Fomin, L. Eisymont","doi":"10.21681/2311-3456-2019-4-02-12","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-02-12","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2022-6-71-82
A. Kostogryzov
Purpose: rational and description of the methodological apparatus of system engineering in terms of risk prediction, taking into account the requirements for information protection. Research methods include: methods of probability theory, risk-oriented models for predictive analysis of standardized processes of system engineering. Result: interrelated models and methods systematized for use in the planning and implementation of standardized processes of system engineering are described. Their use makes it possible to analyze the impact of information security in terms of predicted risks. Methods and models are implemented in a set of system engineering standards and analytically support the effective implementation of agreement, organizational project- enabling, technical management and technical processes according to GOST R 57193 (ISO/IEC/IEEE 15288) in relation to systems for various purposes (a total of 30 processes). The proposed models and methods of system analysis of information security in standardized processes of system engineering develop established approaches to risk prediction, ensuring and improving system security. The use of the proposed models and methods in the life cycle of systems helps to identify «bottlenecks», rational ways to reduce risks in the implemented standardized processes, taking into account the requirements for information protection, supports the making decisions in analytical problems of system engineering. Scientific novelty: the proposed methodological apparatus develops the existing approaches to risk prediction, ensuring and improving systems security. The ideas are implemented in the national standards GOST R 59329 – GOST R 59357. They allow enterprises to move to the pragmatic implementation of a risk-based approach using the analytical capabilities of solving inverse problems of effective security control, based on the specified level of acceptable risk.
目的:考虑到信息保护的要求,从风险预测的角度对系统工程的方法设备进行理性和描述。研究方法包括:概率论方法、面向风险的系统工程标准化过程预测分析模型。结果:描述了系统工程标准化过程的规划和实施中使用的相关模型和方法。它们的使用使得根据预测的风险来分析信息安全的影响成为可能。方法和模型在一套系统工程标准中实施,并根据GOST R 57193 (ISO/IEC/IEEE 15288),分析支持协议、组织项目启用、技术管理和技术过程的有效实施,这些过程与各种目的的系统(总共30个过程)有关。提出了系统工程标准化过程中信息安全系统分析的模型和方法,建立了风险预测、保障和提高系统安全性的方法。在系统生命周期中使用所建议的模型和方法有助于识别“瓶颈”,在实施的标准化过程中合理地减少风险,考虑到信息保护的要求,支持在系统工程的分析问题中做出决策。科学新颖性:提出的方法装置发展了现有的风险预测方法,确保和提高系统安全性。这些想法在国家标准GOST R 59329 - GOST R 59357中得到了实施。它们允许企业根据指定的可接受风险级别,使用解决有效安全控制的逆向问题的分析能力,转向基于风险的方法的实用实现。
{"title":"ON MODELS AND METHODS OF PROBABILISTIC ANALYSIS OF INFORMATION SECURITY IN STANDARDIZED PROCESSES OF SYSTEM ENGINEERING","authors":"A. Kostogryzov","doi":"10.21681/2311-3456-2022-6-71-82","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-6-71-82","url":null,"abstract":"Purpose: rational and description of the methodological apparatus of system engineering in terms of risk prediction, taking into account the requirements for information protection. Research methods include: methods of probability theory, risk-oriented models for predictive analysis of standardized processes of system engineering. Result: interrelated models and methods systematized for use in the planning and implementation of standardized processes of system engineering are described. Their use makes it possible to analyze the impact of information security in terms of predicted risks. Methods and models are implemented in a set of system engineering standards and analytically support the effective implementation of agreement, organizational project- enabling, technical management and technical processes according to GOST R 57193 (ISO/IEC/IEEE 15288) in relation to systems for various purposes (a total of 30 processes). The proposed models and methods of system analysis of information security in standardized processes of system engineering develop established approaches to risk prediction, ensuring and improving system security. The use of the proposed models and methods in the life cycle of systems helps to identify «bottlenecks», rational ways to reduce risks in the implemented standardized processes, taking into account the requirements for information protection, supports the making decisions in analytical problems of system engineering. Scientific novelty: the proposed methodological apparatus develops the existing approaches to risk prediction, ensuring and improving systems security. The ideas are implemented in the national standards GOST R 59329 – GOST R 59357. They allow enterprises to move to the pragmatic implementation of a risk-based approach using the analytical capabilities of solving inverse problems of effective security control, based on the specified level of acceptable risk.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2018-2-52-58
L. Babenko, A. José
{"title":"Investigation of the Symmetric Diagram of the Digital Signature Developed on the Basis of the Algorithm \"GOST R 34.12-2015\"","authors":"L. Babenko, A. José","doi":"10.21681/2311-3456-2018-2-52-58","DOIUrl":"https://doi.org/10.21681/2311-3456-2018-2-52-58","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131445844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2023-1-58-74
A. Kartskhiya, G. Makarenko
The article analyses contemporary legal aspects and current cybersecurity issues, cybercrime features of Rus- sian and foreign law of information and communication technologies. The research methods consist of comparative legal analysis of contemporary Russian and foreign legislation and law enforcement practice, as well as, a formal and logical study of a conceptual apparatus, content and struc- ture of the research object. The study results enable the authors to formulate the awareness of cybercrime legal content, that includes not only offenses committed by using computer technology, but other information and communication equipment and tools, including software either. The rapid spread of cybercrime, the emergence of new forms of organized crime using the global Internet, intended and well-organized cyber attacks on a critical infrastructure of states and private companies indicate the formation of a special area of crime - cybersecurity crime and information technol- ogy, which goes beyond a common insight of crime of information technology and communications. Therefore, the authors came to certain conclusions to conceptualize theoretical and methodological principles, develop the foundations of law and order of cybersecurity, clarify the conceptual apparatus and specifics of legal regulation of cybersecurity in public and private law, as well as the formation of a new line of criminology of cybercrime. The scientific novelty of the study consists of a conceptual justification of a cybercrime countering, as an ele- ment of national cybersecurity, as well as, the substantiation of a specific line of criminology - cybercriminology.
{"title":"Legal Aspects of Modern Cybersecurity and Cybercrime Counteraction","authors":"A. Kartskhiya, G. Makarenko","doi":"10.21681/2311-3456-2023-1-58-74","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-58-74","url":null,"abstract":"The article analyses contemporary legal aspects and current cybersecurity issues, cybercrime features of Rus- sian and foreign law of information and communication technologies. The research methods consist of comparative legal analysis of contemporary Russian and foreign legislation and law enforcement practice, as well as, a formal and logical study of a conceptual apparatus, content and struc- ture of the research object. The study results enable the authors to formulate the awareness of cybercrime legal content, that includes not only offenses committed by using computer technology, but other information and communication equipment and tools, including software either. The rapid spread of cybercrime, the emergence of new forms of organized crime using the global Internet, intended and well-organized cyber attacks on a critical infrastructure of states and private companies indicate the formation of a special area of crime - cybersecurity crime and information technol- ogy, which goes beyond a common insight of crime of information technology and communications. Therefore, the authors came to certain conclusions to conceptualize theoretical and methodological principles, develop the foundations of law and order of cybersecurity, clarify the conceptual apparatus and specifics of legal regulation of cybersecurity in public and private law, as well as the formation of a new line of criminology of cybercrime. The scientific novelty of the study consists of a conceptual justification of a cybercrime countering, as an ele- ment of national cybersecurity, as well as, the substantiation of a specific line of criminology - cybercriminology.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128141152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2023-2-36-51
S. Dichenko, Dmitry Samoilenko, O. Finko, Konstantin Ryumshin
The purpose of the work is to develop a method for monitoring and restoring the integrity of information in secure multidimensional data storage systems that ensures the stability of the systems under consideration under the destructive influences of an intruder and disturbances in the operating environment. Research method: in the course of the research, the scientific and methodological apparatus of the theory of algebraic systems was used in conjunction with the methods of cryptographic information protection and the mathematical apparatus of coding theory to implement the procedures of crypto-code transformations. Models of reliable data storage systems were studied to justify the feasibility of procedures for ensuring the confirmed integrity of the processed information. Results of the study: a method for formalized representation of information in secure multidimensional data storage systems used in the interests of information and analytical systems, which makes it possible to visually describe the developed structures for monitoring and restoring data integrity under the destructive influences of an intruder and disturbances in the operating environment. A mathematical model of the process of monitoring and restoring data integrity based on crypto-code transformations based on the aggregation of cryptographic methods and methods of error-correcting coding is presented. Combining well-known classical solutions to ensure data integrity will reduce the introduced redundancy, as well as expand the functionality of secure information and analytical systems, which consists in confirming the reliability of restoring the integrity of distorted or lost data without additional costs of their repeated control by cryptographic methods. The proposed model takes into account the structure of multidimensional representation of information in the considered data storage systems of information and analytical systems. Scientific novelty: the developed method of parametric synthesis of crypto-code structures for monitoring and restoring the integrity of information in secure multidimensional data storage systems differs from the known ones by obtaining optimal crypto-code structures due to the rational aggregation of cryptographic and code transformations in the parameter space of the considered data storage systems. Crypto-code structures formed on the basis of building multidimensional hash codes and performing transformations in extended Galois fields provide cryptographic control and restoration of information integrity with the possibility of flexible introduction of redundancy and confirmation with cryptographic reliability of information integrity after the restoration procedure
{"title":"A METHOD OF PARAMETRIC SYNTHESIS OF CRYPTO-CODE STRUCTURES FOR MONITORING AND RESTORING THE INTEGRITY OF INFORMATION","authors":"S. Dichenko, Dmitry Samoilenko, O. Finko, Konstantin Ryumshin","doi":"10.21681/2311-3456-2023-2-36-51","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-2-36-51","url":null,"abstract":"The purpose of the work is to develop a method for monitoring and restoring the integrity of information in secure multidimensional data storage systems that ensures the stability of the systems under consideration under the destructive influences of an intruder and disturbances in the operating environment. Research method: in the course of the research, the scientific and methodological apparatus of the theory of algebraic systems was used in conjunction with the methods of cryptographic information protection and the mathematical apparatus of coding theory to implement the procedures of crypto-code transformations. Models of reliable data storage systems were studied to justify the feasibility of procedures for ensuring the confirmed integrity of the processed information. Results of the study: a method for formalized representation of information in secure multidimensional data storage systems used in the interests of information and analytical systems, which makes it possible to visually describe the developed structures for monitoring and restoring data integrity under the destructive influences of an intruder and disturbances in the operating environment. A mathematical model of the process of monitoring and restoring data integrity based on crypto-code transformations based on the aggregation of cryptographic methods and methods of error-correcting coding is presented. Combining well-known classical solutions to ensure data integrity will reduce the introduced redundancy, as well as expand the functionality of secure information and analytical systems, which consists in confirming the reliability of restoring the integrity of distorted or lost data without additional costs of their repeated control by cryptographic methods. The proposed model takes into account the structure of multidimensional representation of information in the considered data storage systems of information and analytical systems. Scientific novelty: the developed method of parametric synthesis of crypto-code structures for monitoring and restoring the integrity of information in secure multidimensional data storage systems differs from the known ones by obtaining optimal crypto-code structures due to the rational aggregation of cryptographic and code transformations in the parameter space of the considered data storage systems. Crypto-code structures formed on the basis of building multidimensional hash codes and performing transformations in extended Galois fields provide cryptographic control and restoration of information integrity with the possibility of flexible introduction of redundancy and confirmation with cryptographic reliability of information integrity after the restoration procedure","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114456767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-1-59-68
V. Leontiev, E. Gordeev
{"title":"On the Algebraic Immunity of Coding Systems","authors":"V. Leontiev, E. Gordeev","doi":"10.21681/2311-3456-2019-1-59-68","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-1-59-68","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114859384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2023-2-52-64
D. Moldovyan, N. Moldovyan
Purpose of work is the reduction in the size of the public key of public-key algorithms of multivariate cryptography based on the computational difficulty of solving systems of many power equations with many unknowns. Research method is use of non-linear mappings defined as exponentiation operations in finite extended fields GF(qm) represented in the form of finite algebras. The latter makes it possible to perform the exponentiation operation in the field GF(qm) by calculating the values of power polynomials over the field GF(q), which define a hardly reversible nonlinear mapping of the vector space over GF(q) with a secret trapdoor. Due to the use of nonlinear mappings of this type, it is possible to specify a public key in multidimensional cryptography algorithms in the form of a nonlinear mapping implemented as a calculation of the values of a set of polynomials of the third and sixth degree. At the same time, due to the use of masking linear mappings that do not lead to an increase in the number of terms in polynomials, the size of the public key is reduced in comparison with known analogue algorithms, in which the public key is represented by a set of polynomials of the second and third degrees. The proposed approach potentially expands the areas of practical application of post-quantum algorithms for public encryption and electronic digital signature, related to multidimensional cryptography, by significantly reducing the size of the public key. Results of the study are the main provisions of a new approach to the development of algorithms of multidimensional cryptography are formulated. Hardly invertible nonlinear mappings with a secret trapdoor are proposed in the form of exponentiation operations to the second and third powers in finite extended fields GF(qm), represented in a form of a finite algebra. A rationale is given for specifying a public key in a form that includes a superposition of two non-linear mappings performed as a calculation of a set of second and third degree polynomials defined over GF(q). Techniques for implementing mappings of this type are proposed and specific options for specifying the fields GF(qm) in the form of finite algebras are considered. An estimate of the size of the public key in the algorithms developed within the framework of the new approach is made. at a given security level.. Practical relevance includes the developed main provisions of a new method for constructing multidimensional cryptography algorithms based on the computational difficulty of solving systems of many power equations with many unknowns and related to post-quantum cryptoschemes. The proposed approach expands the areas of practical application of post-quantum algorithms of this type by significantly reducing the size of the public key, which provides the prerequisites for improving performance and reducing technical resources for their implementation
{"title":"A NEW APPROACH TO THE DEVELOPMENT OF MULTIDIMENSIONAL CRYPTOGRAPHY ALGORITHMS","authors":"D. Moldovyan, N. Moldovyan","doi":"10.21681/2311-3456-2023-2-52-64","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-2-52-64","url":null,"abstract":"Purpose of work is the reduction in the size of the public key of public-key algorithms of multivariate cryptography based on the computational difficulty of solving systems of many power equations with many unknowns. Research method is use of non-linear mappings defined as exponentiation operations in finite extended fields GF(qm) represented in the form of finite algebras. The latter makes it possible to perform the exponentiation operation in the field GF(qm) by calculating the values of power polynomials over the field GF(q), which define a hardly reversible nonlinear mapping of the vector space over GF(q) with a secret trapdoor. Due to the use of nonlinear mappings of this type, it is possible to specify a public key in multidimensional cryptography algorithms in the form of a nonlinear mapping implemented as a calculation of the values of a set of polynomials of the third and sixth degree. At the same time, due to the use of masking linear mappings that do not lead to an increase in the number of terms in polynomials, the size of the public key is reduced in comparison with known analogue algorithms, in which the public key is represented by a set of polynomials of the second and third degrees. The proposed approach potentially expands the areas of practical application of post-quantum algorithms for public encryption and electronic digital signature, related to multidimensional cryptography, by significantly reducing the size of the public key. Results of the study are the main provisions of a new approach to the development of algorithms of multidimensional cryptography are formulated. Hardly invertible nonlinear mappings with a secret trapdoor are proposed in the form of exponentiation operations to the second and third powers in finite extended fields GF(qm), represented in a form of a finite algebra. A rationale is given for specifying a public key in a form that includes a superposition of two non-linear mappings performed as a calculation of a set of second and third degree polynomials defined over GF(q). Techniques for implementing mappings of this type are proposed and specific options for specifying the fields GF(qm) in the form of finite algebras are considered. An estimate of the size of the public key in the algorithms developed within the framework of the new approach is made. at a given security level.. Practical relevance includes the developed main provisions of a new method for constructing multidimensional cryptography algorithms based on the computational difficulty of solving systems of many power equations with many unknowns and related to post-quantum cryptoschemes. The proposed approach expands the areas of practical application of post-quantum algorithms of this type by significantly reducing the size of the public key, which provides the prerequisites for improving performance and reducing technical resources for their implementation","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117252709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-5-34-41
S. Migalin, A. Skuratov, A. Los
{"title":"Study the Possibility of Developing a Universal Tool for Tunneling TCP-traffic the DNS Protocol","authors":"S. Migalin, A. Skuratov, A. Los","doi":"10.21681/2311-3456-2019-5-34-41","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-5-34-41","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2021-5-30-35
V. Gribunin, A. Timonov
Purpose of the article: optimization of the choice of information security tools in a multi-level automated system, taking into account higher levels, quality indicators of information security tools, as well as the general financial budget. Demonstration of analogies of solving these problems with known problems from communication theory. Research method: optimal choice of information security tools based on risk analysis and the Lagrange multiplier method; Optimal bit budget allocation based on the Waterfilling optimization algorithm. Optimal placement of information security tools in a multilevel automated system based on bisectional search. Obtained result: the article shows analogies between some problems of communication theory and the optimal choice of information security tools. The well-known problem of the optimal choice of information security tools is solved using the rate-distortion theory, the well-known problem of the optimal budget allocation for their purchase is solved by analogy with the problem of distributing the power of transmitters. For the first time, the problem posed for the optimal placement of information security tools in a multilevel automated system was solved by analogy with the problem of distributing the total bit budget between quantizers.
{"title":"On the Analogy of the Problems of Optimizing the Choice of Information Security Controls with Some Problems of Communication Theory","authors":"V. Gribunin, A. Timonov","doi":"10.21681/2311-3456-2021-5-30-35","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-30-35","url":null,"abstract":"Purpose of the article: optimization of the choice of information security tools in a multi-level automated system, taking into account higher levels, quality indicators of information security tools, as well as the general financial budget. Demonstration of analogies of solving these problems with known problems from communication theory. Research method: optimal choice of information security tools based on risk analysis and the Lagrange multiplier method; Optimal bit budget allocation based on the Waterfilling optimization algorithm. Optimal placement of information security tools in a multilevel automated system based on bisectional search. Obtained result: the article shows analogies between some problems of communication theory and the optimal choice of information security tools. The well-known problem of the optimal choice of information security tools is solved using the rate-distortion theory, the well-known problem of the optimal budget allocation for their purchase is solved by analogy with the problem of distributing the power of transmitters. For the first time, the problem posed for the optimal placement of information security tools in a multilevel automated system was solved by analogy with the problem of distributing the total bit budget between quantizers.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"374 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124683253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-1-35-44
E. Basan, A. Basan, O. Makarevich, Lyudmila Babenko
{"title":"Studying the Impact of Active Network Attacks on a Mobile Robots Group","authors":"E. Basan, A. Basan, O. Makarevich, Lyudmila Babenko","doi":"10.21681/2311-3456-2019-1-35-44","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-1-35-44","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121400566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}