Article citationsMore >>

Order number 60 of the Department of the special telecommunication systems and information security of Ukraine Service, ND TIS 3.6-001-2000. Technical information security. Computers systems. An order of creation, introduction, accompaniment and modernization of facilities of technical information security, is from an unauthorized access, 20 Dec 2000.

has been cited by the following article:

Article

Selection Criteria of the Tools of Information Security from Unauthorized Access into Computer Systems of Different Classes

1IT-Security Academic Department, National Aviation University, Kyiv, Ukraine


Journal of Computer Networks. 2014, Vol. 2 No. 2, 18-22
DOI: 10.12691/jcn-2-2-3
Copyright © 2014 Science and Education Publishing

Cite this paper:
Oleksiy Gavrylenko, Sergiy Gnatyuk, Dmytro Matviiv. Selection Criteria of the Tools of Information Security from Unauthorized Access into Computer Systems of Different Classes. Journal of Computer Networks. 2014; 2(2):18-22. doi: 10.12691/jcn-2-2-3.

Correspondence to: Sergiy  Gnatyuk, IT-Security Academic Department, National Aviation University, Kyiv, Ukraine. Email: s.gnatyuk@nau.edu.ua

Abstract

The authors of the article proposed the definition of selection criteria of technical products protection of information from unauthorized access in automated systems of different classes based on the analysis and synthesis of classifications, characteristics and requirements to the known products for the purpose of forming the appropriate method of choice product protection.

Keywords