Безопасность информационных технологий (Sep 2024)

On the possibility of improving the procedures for quantifying information protection of critical information infrastructure objects from threats of unauthorized access

  • Sergey V. Skryl,
  • Anastasiya A. Itskova,
  • Kirill E. Ushakov

DOI
https://doi.org/10.26583/bit.2024.3.04
Journal volume & issue
Vol. 31, no. 3
pp. 94 – 104

Abstract

Read online

The article develops a functional model of unauthorized access (UA) protection mechanisms at information infrastructure objects (IIOs). It defines the content of protection measures, techniques used, and stages of their implementation. It substantiates the order of execution of individual functional components of the structural representation of the objective function "Protection of information of IIOs from UA". The sequence of implementation of these components is illustrated as a change in the states of the Markov process for constructing such a model. A table is provided of the correspondence between the list of procedures performed by an intruder in the process of implementing an UA threat to information of an IIOs and the procedures for protecting information, and it demonstrates the possibility of transition from the description of information protection measures from UA at IIOs in terms of functional modeling to the mathematical representation of the time characteristics of the functional components of the objective function of protection. The corresponding analytical expressions are provided for various options for representing the order of the functional components performed.

Keywords