METHOD OF THE STUDY OF PRIVACY PROTECTION IN INFORMATION SYSTEMS

METHOD OF THE STUDY OF PRIVACY PROTECTION IN INFORMATION SYSTEMS

Выбор валюты
Дата публикации статьи в журнале: 25.12,2019
Название журнала: Американский Научный Журнал, Выпуск: № (32) / 2019, Том: 2, Страницы в выпуске: 47-50
Автор:
Moscow, National Research University of Electronic Technology Zelenograd,, Candidate of technical Sciences, associate Professor
Автор:
, ,
Автор:
, ,
Анотация: Abstract. The article presents an analysis of the problem of investigating the security of confidential information, formulates a goal, principles, and provides a multi-level research scheme, the content of work at each level (problem, concept, system, and detail). The description of single-level and multilevel models for analysis and synthesis of confidential information protection subsystem. The article describes the conditions for selecting an effective concept for building a subsystem for information confidentiality protection based on sufficient result and minimizing costs principles. Practical considerations for the application of the method of justification of requirements to the subsystem of protection of confidentiality, conclusions, and directions for further research.
Ключевые слова: security system  confidentiality   system of information protection  privacy protection subsystem              
DOI:
Данные для цитирования: Voevodin V.A. . METHOD OF THE STUDY OF PRIVACY PROTECTION IN INFORMATION SYSTEMS. Американский Научный Журнал. Физико-математические науки. 25.12,2019; № (32) / 2019(2):47-50.

Список литературы: References ISO/IEC 27001:2005 Information technology — Security techniques — Information security management systems — Requirements (IDT). ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements (IDT). Volkova V. N., Voronkov V. A. and Denisov A.A. System theory and systems analysis methods in management and communication. − M.: Radio and communication. − 1983. Romanov V. N. The technique of the analysis of complex systems. − SPb.: SZTU 2011. Ovchinnikov V. A. The graphs in problems of analysis and synthesis of structures of difficult systems / V. A. Ovchinnikov. − M.: MGTU N. E. Bauman, 2014. Larin A. A. Theoretical bases of management. Part I. Processes, systems and control. M.: RVSN, 1998. Mesarovic, M. D. Macko and Y. Takahara. Theory of Hierarchical Multilevel Systems. Academic Press, New York and London, 1970. pp. 4-34, 34 -63. Khokhlachov E. N. The theoretical foundations of management. Part 2. Analysis and synthesis of control systems. – M.: RVSN, 1996. G. J. Klir, Architecture of Systems Problem Solving. Springer Science+Business Media New York, 1985, pp. 1-29, 175-293, 417-468. Utkin L.V. Risk analysis and decision making with incomplete information. SPb.: Science 2007, 404 p. Reliability and efficiency in technique. Reference guide in 10 volumes: vol. 3. The effectiveness of technical systems./ Under the General editorship of V. V. Utkin, Y. V. Kryuchkova. M.: Mechanical engineering, 1988. Associate Professor Voevodin V.A., Igoshin V.V., Makoveev K.D. and Makhaylovskaya A.S. About APCS public key infrastructure unauthorized access information security audit program. – M.: Processing of the international Conference REDS-2018 Radioelectronic devices and systems for information and communication technologies, 2018. pp. 318 -322.