Journal of Computer Networks
ISSN (Print): 2372-4749 ISSN (Online): 2372-4757 Website: http://www.sciepub.com/journal/jcn Editor-in-chief: Sergii Kavun, Naima kaabouch
Open Access
Journal Browser
Go
Journal of Computer Networks. 2014, 2(2), 18-22
DOI: 10.12691/jcn-2-2-3
Open AccessResearch Article

Selection Criteria of the Tools of Information Security from Unauthorized Access into Computer Systems of Different Classes

Oleksiy Gavrylenko1, Sergiy Gnatyuk1, and Dmytro Matviiv1

1IT-Security Academic Department, National Aviation University, Kyiv, Ukraine

Pub. Date: June 03, 2014
(This article belongs to the Special Issue Parallel computing and Protection Information)

Cite this paper:
Oleksiy Gavrylenko, Sergiy Gnatyuk and Dmytro Matviiv. Selection Criteria of the Tools of Information Security from Unauthorized Access into Computer Systems of Different Classes. Journal of Computer Networks. 2014; 2(2):18-22. doi: 10.12691/jcn-2-2-3

Abstract

The authors of the article proposed the definition of selection criteria of technical products protection of information from unauthorized access in automated systems of different classes based on the analysis and synthesis of classifications, characteristics and requirements to the known products for the purpose of forming the appropriate method of choice product protection.

Keywords:
threat information automated system technical protection of information complex system of information security information security product unauthorized access technical task software criteria of choice method

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  Decree of President of Ukraine, Position number 17 is about a technical information security in Ukraine, List of tools of the general setting, which are selected for providing of technical information security, necessity of guard of which by the legislation of Ukraine, 27 Sep 1999.
 
[2]  Law of Ukraine, About information security in informatively telecommunication systems, 5 Jul 1994. [Online] Available: http://zakon4.rada.gov.ua/laws/show/80/94-вр.
 
[3]  Order number 22 of the Department of the special telecommunication systems and information security of Ukraine Service, ND TIS 2.5-004-99. Criteria of estimation of protection of information are in the computer systems from an unauthorized access, 28 Apr 1999.
 
[4]  I.Z. Duchyak, Creation of classifiers, 2010. [Online] Available: http://pidruchniki.ws/1633082637655/logika/stvorennya_klasifikatoriv.
 
[5]  L.I. Abrosymov, A.Y. Koablev, Methods and security information tools, [E-book] Available: http://www.melnikoff.com/yuriy/ posobie.htm.
 
[6]  Order number 472 of the Administration of Government service of special communication and information security of Ukraine, ND TIS 1.5-002-2012. Classifier of tools of technical security information, 29 Aug 2012.
 
[7]  I.I. Simora, O.V. Gavrylenko, Classifier of tools of information security in informatively telecommunication systems, The 3rd international Scientific Conference ITSEC, National aviation university, 145.
 
[8]  GOST P ISO/MEC 12182-2002, Classification of programmatic tools, 01 Dec 2002.
 
[9]  ISO/IEC 15408-1:2009, Information technology -- Security techniques, Evaluation criteria for IT security -- Part 1: Introduction and general model.
 
[10]  Position number 1299 about a technical information security in Ukraine, ND TIS 3.7-001-99. The methodical pointing is in relation to creating of requirement specification on creation of the system of information security of automated system, 27 Sep 1999.
 
[11]  Order number 22 of the Department of the special telecommunication systems and information security of Ukraine Service, ND TIS 2.5-005-99. Classification of AS and standard functional types of protected of the processed information is from an unauthorized access, 28 Apr 1999.
 
[12]  Order number 93 of the Administration of Government service of special communication and information security of Ukraine, Position about state examination in the sphere of technical information security, 16 May 2007.
 
[13]  State standard of Ukraine, DSTU 3974-200. The system of development and imputing of products is on a production: Rule implementation of experimental and designer work, 01 Jun 2000.
 
[14]  List of facilities of TIS, which have an expert conclusion about accordance with the requirements of technical information security, [Online] Available: http://dstszi.kmu.gov.ua/dstszi/ control/uk/publish/. /.[Accessed May. 2, 2014].
 
[15]  Order number 200 of State standard of Ukraine, DSTU 3396.2-97. information security. Technical information security. Terms and determinations.11 Apr 1997.
 
[16]  Order number 60 of the Department of the special telecommunication systems and information security of Ukraine Service, ND TIS 3.6-001-2000. Technical information security. Computers systems. An order of creation, introduction, accompaniment and modernization of facilities of technical information security, is from an unauthorized access, 20 Dec 2000.
 
[17]  Order of the Department of the special telecommunication systems and information security of Ukraine Service, ND TIS 2.7-009-09. Guidelines for the evaluation of functional services security tools protecting information in computer systems from unauthorized access.
 
[18]  Tax Code of Ukraine number № 2755-VI., 02 Dec 2010. [Online]. Available: http://zakon4.rada.gov.ua/laws/show/2755-17/. [Accessed May. 2, 2014].
 
[19]  State standard of Ukraine, DSTU 3396.0-96 Information Security. Technical protection of information. The main provisions, 01 Jan 1997.
 
[20]  Information security tool, [Online] Available: http://avtoprom. kiev.ua/avtoprom/ua/content/.