Национальный цифровой ресурс Руконт - межотраслевая электронная библиотека (ЭБС) на базе технологии Контекстум (всего произведений: 634699)
Контекстум
.
0   0
Первый авторStyugin
АвторыAlexey A.
Страниц13
ID453700
АннотацияThe problem of the functional structures research is considered in this example of information systems. A feature of such research is that it is not always possible to ensure that the research results will match reality. This is a topic of current interest in the field of design and analysis of information security systems and software analysis for undeclared capabilities of systems in general. By undeclared capabilities, we refer to a functionality available in software that is invisible to users and can be used / exploited by an intruder. This paper presents a model of a researcher and of a functional object investigated by him. Based on this model, informational limitations of the researcher are shown. The mathematical model of the subjective structure of an investigated system is constructed. It is shown in which cases this structure is stable. This article answers the question of if the researcher can claim that his subjective functional structure corresponds to the actual structure of the investigated system. We provide examples of such approach on certain mathematical models of information security.
УДК004.056.5
Styugin, MikhailA. Mathematical Modeling of User Perception in Information Security Systems / MikhailA. Styugin, A. Alexey // Журнал Сибирского федерального университета. Математика и физика. Journal of Siberian Federal University, Mathematics & Physics .— 2015 .— №4 .— С. 80-92 .— URL: https://rucont.ru/efd/453700 (дата обращения: 25.04.2024)

Предпросмотр (выдержки из произведения)

Mathematics & Physics 2015, 8(4), 454–466 УДК 004.056.5 Mathematical Modeling of User Perception in Information Security Systems Mikhail A. Styugin∗ Siberian State Aerospace University Krasnoyarsky Rabochy, 31, Krasnoyarsk, 660014 Institute of Space and Information Technology Russia Siberian Federal University Kirenskogo, 26, Krasnoyarsk, 660041 Russia Alexey A.Kytmanov† Institute of Space and Information Technology Siberian Federal University Kirenskogo, 26, Krasnoyarsk, 660041 Russia Received 24.07.2015, received in revised form 10.08.2015, accepted 20.09.2015 The problem of the functional structures research is considered in this example of information systems. <...> This is a topic of current interest in the field of design and analysis of information security systems and software analysis for undeclared capabilities of systems in general. <...> By undeclared capabilities, we refer to a functionality available in software that is invisible to users and can be used / exploited by an intruder. <...> The mathematical model of the subjective structure of an investigated system is constructed. <...> This article answers the question of if the researcher can claim that his subjective functional structure corresponds to the actual structure of the investigated system. <...> We provide examples of such approach on certain mathematical models of information security. <...> Keywords: mathematical models of information security, model of the researcher, information structure of the conflict, information flows, misinformation, black box model, graph theory. <...> DOI: 10.17516/1997-1397-2015-8-4-454-466 Introduction Information management in the sense of the knowledge of structure of a system and its vulnerabilities is an important issue in the field of information security. <...> On the other hand, effectiveness of information security depends on a potential intruder’s knowledge about the system: how close ∗styugin@gmail.com †aakytm@gmail.com ⃝ Siberian Federal University. <...> All rights reserved c – 454 – Mikhail A. Styugin, Alexey A.Kytmanov Representation of Preferences by Generalized Coherent Risk . his knowledge is to the real picture. <...> For the modeling of such systems, it is necessary to split all the information on the system into an objective one and a subjective one. <...> The level of similarity between a subjective image and the real structure of the system depends on the objects in the system to which the subject has an access and from which he can get a response. <...> Under certain circumstances this level of similarity can dramatically <...>