Imitation modeling possibilities for research of the information protection system functioning

Бесплатный доступ

The article considers main provisions, principles and stages of computer modelingof information security processes and systems. It proves the necessity and topical-ity of solving problems of ensuring information security for the uninterruptedfunctioning of business systems. Based on the assumption that the functioning ofsuch a complex system as the organization’s information security system which isassociated with a certain degree of uncertainty, it is recommended that the simula-tion tool is used to investigate and select the option for constructing such a system.The proposed simulation model is built using the ARENA simulation software,imitating attacks by attackers on the organization’s information infrastructure.The ‘attack’ and ‘transactional attack’ terms within this article are used to denotesuch illegal actions by intruders as unauthorized access to information, intercep-tion of information at the time of its transmission, device failure, interference inthe functioning of business processes.

Еще

Information security, simulation model, attack, measures and means of protection, information resources, risk, information protection, model, imitation, transactional attack

Короткий адрес: https://sciup.org/140244113

IDR: 140244113

Статья научная