ПРОГРАММНЫЕ РЕШЕНИЯ ДЛЯ АНАЛИЗА ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

THE SOFTWARE SOLUTIONS FOR THE ANALYSIS OF INFORMATION SECURITY

Kostrova V.N.   Горбенко О.V.  

UDC 681.3
DOI:

  • Abstract
  • List of references
  • About authors

In the paper the analysis of the modern software solutions intended for an assessment of characteristics of information security is carried out. The features of protection of workstations are noted. The characteristics of programs for an assessment of information risks are specified.

1. Palchunov, D.E. Solving information-based search tasks ontology // Business Informatics, vol. 1, 2008, p. 3-13.

2. Palchunov, D.E. Search and extraction of knowledge: the creation of new knowledge based on the analysis of natural language texts // Philosophy Sciences. 2009. No4 (43). S. 70-90.

3. Fomina Yu.A., Preobrazhensky Yu.P. Indexing Principles information in search engines / Bulletin of Voronezh Institute of High Technologies. 2010. No. 7. S. 98-100.

4. Ivanov M.S., Preobrazhensky Yu.P. Algorithm development tree clipping / Bulletin of the Voronezh Institute of High technology. 2008. No. 3. S. 031-032.

5. Zazulin A.V., Preobrazhensky Yu.P. Construction Features semantic domain models / Bulletin Voronezh Institute of High Technologies. 2008. No. 3. S. 026-028.

6. Ermolova VV, Preobrazhensky Yu.P. Exchange System Architecture messages in a non-routed network / Bulletin of Voronezh Institute of High Technologies. 2010. No. 7. P. 79-81.

7. Miloshenko OV Methods for assessing propagation characteristics radio waves in mobile radio communication systems / Bulletin Voronezh Institute of High Technologies. 2012. No. 9. S. 60-62.

8. Mishin Ya.A. About CAD systems in wireless networks / Bulletin of the Voronezh Institute of High technology. 2013. No. 10. P. 153-156.

9. Golovinov S.O., Khromykh A.A. Systems Management Issues Mobile Communications / Bulletin of the Voronezh Institute of High technology. 2012. No. 9. S. 13-14.

10. Internet portal of the company Informzashita, software developer "NetTrap": http://www.infosec.ru/ [Electronic resource] Access: 03/18/2015.

11. Palchunov, D.E., Yakhyaeva, G.E. Interval fuzzy algebraic systems // Proceedings of the Asian Logic Conference 2005. World Scientific Publishers. 2006, pp. 23-37.

12. Wille, R. Formal Concept Analysis as Mathematical Theory of Concepts and Concept Hierarchies // Fachbereich Mathematik Technische Hochschule Darmstadt, 2005, - 347 p.

13. SM method of automatic generation of hypotheses: Logical and Modeling, optimization and information technology. Scientific journal No. 1 (8) http://moit.vivt.ru/ 2015 epistemological foundations // Comp. Anshakov, O.M., Fabrikantova, E.F .; Under the total. Ed. Anshakova, O.M. - M .: Book LIBROCOM house, 2009. - 432 p.

14. Internet portal of the Kaspersky Lab company, Software Developer "Kaspersky Internet Security 2015": http://www.kaspersky.ru/ [Electronic resource] Access: 03/08/2015.

15. Palchunov, D.E., Yahyaev, G.E. Fuzzy algebraic systems // Bulletin of NSU. Series: Mathematics, Mechanics, Computer Science. 2010. V.10, no. 3, pp. 75-92.

16. Rubens, Paul. Medusa: Open Source Software "Login Brute-Forcer" for Password Auditing: http://www.serverwatch.com/tutorials/article.php/3886791/Medusa-OpenSource-Software-Login-BruteForcer-for-Password-Auditing.htm/ [Electronic resource] Access: 03/08/2015.

17. Deshina A.E., Choporov ON, Razinkin K.A. Information Risks in multiserver systems: selection of protection system parameters / Information and security. 2013.V. 16. No. 3. S. 365-370.

18. Dushkin A.V., Choporov O.N. Threat decomposition model security information and telecommunication systems / Information and security. 2007.V. 10. No. 1. P. 141-146.

19. Zavyalov D.V. On the application of information technology / Modern high technology. 2013. No. 8-1. S. 71-72.

20. Deshina A.E., Ushkin I.A., Choporov O.N. Integral Evaluation general risk in the synthesis of ITKS based on its risk parameters Components / Information and Security. 2013.V. 16. No. 4. P. 510- 513.

21. Medvedovsky I. D. Modern methods and means of analysis and risk control of information systems of companies [Electronic resource]. - Access mode: http://www.bugtraq.ru/library/security/itrisk.html Access: 03/08/2015.

22. Pastoev. A. IT Risk Management Methodologies [Electronic resource]. - Access mode: http://www.iso27000.ru/chitalnyizai/upravlenie-riskami-informacionnoi-bezopasnosti/metodologiiupravleniya-it-riskami, Access: 03/08/2015.

23. Oracle. Information decides [Electronic resource]. - Access mode: http://www.oracle.com/us/products/middleware/bus-int/crystalball/cbbrochure-404904.pdf, Access: 03/08/2015.

Kostrova Vera Nikolaevna
Doctor of Technical Sciences, Professor
Email: kostrovavrn@gmail.ru

Voronezh State Technical University

Voronezh, Russian Federation

Горбенко Олеся Vladimirovna

Email: maly.wy@yandex.ru

Voronezh Institute of High Technologies

Voronezh, Russian Federation

Keywords: information security,, program, safety, computer

For citation: Kostrova V.N. Горбенко О.V. THE SOFTWARE SOLUTIONS FOR THE ANALYSIS OF INFORMATION SECURITY. Modeling, Optimization and Information Technology. 2015;3(1). Available from: https://moit.vivt.ru/wp-content/uploads/2015/04/KostrovaMiloshenko_1_15_2.pdf DOI: (In Russ).

418

Full text in PDF