Abstract:Introduction: Distributed in space-time Networks: IIoT and IoT, fog and edge computing tend to penetrate into all spheres of human activity. Enterprises, government, law enforcement agencies, etc. depend on the quality of those technologies. Purpose: To determine the composition of the Network that provides the required uptime probability. Methods: According to the concept of structural and functional synthesis, a distributed Network is presented as an unstable queuing system in which servicing devices are con… Show more
The complexity of ensuring the availability of geoinformation systems resources is due to the volatile structure of the system, the uncertainty of user tasks and destructive influences. This paper proposes methods that allow to halve the probability of information security risk associated with the disruption of resource availability. The effect is achieved by: 1) preserving the required probability of achieving the activity goal of the identification system, regardless of the strength of disruptive influences; 2) by aggregating the performance of individual physical system elements into virtual pools; and 3) by converting internal user task reserves into performance reserves. The performance of the methods was evaluated using a simulation model developed in MATLAB environment.
The complexity of ensuring the availability of geoinformation systems resources is due to the volatile structure of the system, the uncertainty of user tasks and destructive influences. This paper proposes methods that allow to halve the probability of information security risk associated with the disruption of resource availability. The effect is achieved by: 1) preserving the required probability of achieving the activity goal of the identification system, regardless of the strength of disruptive influences; 2) by aggregating the performance of individual physical system elements into virtual pools; and 3) by converting internal user task reserves into performance reserves. The performance of the methods was evaluated using a simulation model developed in MATLAB environment.
The field of information security covers a wide range of technical, organizational and social aspects, requiring information security specialists to take a unique and comprehensive approach to the development, support, operation, evaluation and improvement of information security management systems. An important element of successful information protection is the accurate identification and assessment of risks and vulnerabilities that may become a source of threats. In existing publications, as a rule, it is assumed that specialists have the necessary experience and knowledge to conduct risk analysis. However, in the dynamic world of information technology and threats, an information security specialist faces a huge amount of information and potential risks that are constantly evolving. Because of this, it is an impossible task to keep in mind all kinds of threats to information security.
The purpose is to identify actual problems of information security, potentially acting as sources of information security risk, based on the method of systematic review of the literature. Results: 73 actual problems of information security have been identified, which an information security specialist should take into account in his activities. Understanding these issues makes it possible to develop more effective protection strategies, as well as to make informed and informed decisions when developing and applying security measures.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.