Visible to the public Biblio

Filters: Author is Eryshov, V. G.  [Clear All Filters]
2022-09-30
Ilina, D. V., Eryshov, V. G..  2021.  Analytical Model of Actions of the Information Security Violator on Covert Extraction of Confidential Information Processed on the Protected Object. 2021 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF). :1–4.
The article describes an analytical model of the actions of an information security violator for the secret extraction of confidential information processed on the protected object in terms of the theory of Markov random processes. The characteristics of the existing models are given, as well as the requirements that are imposed on the model for simulating the process. All model states are described in detail, as well as the data flow that is used in the process simulation. The model is represented as a directed state graph. It also describes the option for evaluating the data obtained during modeling. In the modern world, with the developing methods and means of covert extraction of information, the problem of assessing the damage that can be caused by the theft of the organization's data is acute. This model can be used to build a model of information security threats.