×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Graph-theoretic interpretation of information security system

    An integrated information security system combining dynamism and efficiency is proposed, and a quantitative assessment of this system is presented. The study is aimed at identifying all potential switching routes of maximum length between unique states, taking into account potential difficulties that may arise when implementing a recomposition information security system. The main tool for analyzing and modeling various transition configurations in the system under study is the apparatus of graph theory. Within the framework of the proposed approach, each subsystem includes several independent options or components, and at any given time only one of these options functions. An important aspect is both the interaction between the subsystems and the ability to switch components within one subsystem. For a visual understanding of the proposed approach, an example is given that illustrates the basic principles and mechanisms of the developed system.

    Keywords: information security system, state graph, DLP system, IPS/IDS system

  • Quantitative assessment of the recompositional information security system

    This paper is devoted to the quantitative assessment of the information security system. The authors propose to build a system that combines components with the properties of dynamism and protection efficiency. The proposed information security system includes two types of antivirus components, three data leakage prevention systems, and four intrusion detection and prevention systems. For clarity, the article provides a theoretical and graphical interpretation of the information security system. Each possible path in the system represents its state. It is shown that adding new components or subsystems leads to an increase in all possible states of the system, complicating the analysis by an intruder. Within the framework of this multi-component approach, each element of the system interacts with others, which helps to achieve the optimal level of efficiency in ensuring information security. In addition, the proposed approach is characterized by scalability, which ensures seamless integration of both individual components and subsystems as a whole.

    Keywords: recomposition, information security system, DLP system, IPS/IDS system