Imitation modeling possibilities for research of the information protection system functioning
Автор: Stelmashonok Elena Viktorovna, Stelmashonok Vitaly Leonidovich
Журнал: Петербургский экономический журнал @gukit-journal
Рубрика: Теория и практика управления организационно-экономическими системами
Статья в выпуске: 4 (20), 2017 года.
Бесплатный доступ
The article considers main provisions, principles and stages of computer modelingof information security processes and systems. It proves the necessity and topical-ity of solving problems of ensuring information security for the uninterruptedfunctioning of business systems. Based on the assumption that the functioning ofsuch a complex system as the organization’s information security system which isassociated with a certain degree of uncertainty, it is recommended that the simula-tion tool is used to investigate and select the option for constructing such a system.The proposed simulation model is built using the ARENA simulation software,imitating attacks by attackers on the organization’s information infrastructure.The ‘attack’ and ‘transactional attack’ terms within this article are used to denotesuch illegal actions by intruders as unauthorized access to information, intercep-tion of information at the time of its transmission, device failure, interference inthe functioning of business processes.
Information security, simulation model, attack, measures and means of protection, information resources, risk, information protection, model, imitation, transactional attack
Короткий адрес: https://sciup.org/140244113
IDR: 140244113