Institute of information security problems (researcher and lecturer)
Kazakhstan
This paper examines the problem of constructing integrated information security systems, specifically organizing the information interactions between their modules. To support a well-founded selection of the most effective organization for such interactions, a corresponding evaluation methodology is proposed, presented both schematically (from the perspective of an expert and a computing tool) and analytically. The methodology is based on graphical modeling of the integrated security system in terms of the interactions between its modules, enabling the calculation of absolute performance indicators. Using the same indicators for an «ideal» system, specific indicators are determined, suitable for direct comparison and the calculation of the integrated performance value. Based on the authors' previous research, methods for implementing these steps are proposed. The novelty of the methodology, its theoretical and practical significance, and potential future research are highlighted.
integrated information security system, architecture, intermodule interaction, efficiency mark, methodology
1. Cifrovye tekhnologii i problemy informacionnoj bezopasnosti / T.I. Abdullin [i dr.]. SPb.: Sankt-Peterburgskij gosudarstvennyj ekonomicheskij universitet, 2021. 163 s.
2. Bujnevich M.V., Pokusov V.V., Izrailov K.E. Model' ugroz informacionno-tekhnicheskogo vzaimodejstviya v integrirovannoj sisteme zashchity informacii // Informatizaciya i svyaz'. 2021. № 4. S. 66–73. DOI:https://doi.org/10.34219/2078-8320-2021-12-4-66-73.
3. Assessment of Information Security in Integrated Systems / T.Yu. Khashirova [et al.] // Quality management, transport and information security, information technologies: the proceedings of international conference. Yaroslavl, 2021. P. 201–205. DOI:https://doi.org/10.1109/ITQMIS53292.2021.9642824.
4. Pokusov V.V. Formalizaciya i opredelenie korrektnosti protokola informacionno-tekhnicheskogo vzaimodejstviya (na primere integrirovannoj sistemy zashchity informacii) // Informatizaciya i svyaz'. 2021. № 2. S. 55–68. DOI:https://doi.org/10.34219/2078-8320-2021-12-2-55-68.
5. Bujnevich M.V., Lozhkina O.V., Yaroshenko A.Yu. Arhitekturnye modeli kompleksnoj i integrirovannoj bezopasnosti informacionnyh sistem: sravnitel'nyj analiz podhodov // Nauch.-analit. zhurn. «Vestnik S.-Peterb. un-ta GPS MChS Rossii». 2021. № 1. S. 100–108.
6. Pokusov V.V. Ocenka effektivnosti sistemy obespecheniya IB. Chast' 1. Pokazateli i modeli predstavleniya // Zashchita informacii. Insajd. 2019. № 2 (86). S. 54–60.
7. Pokusov V.V. Ocenka effektivnosti sistemy obespecheniya IB. Chast' 2. Metodika i rezul'taty // Zashchita informacii. Insajd. 2019. № 3 (87). S. 64–72.
8. Osnovnye principy proektirovaniya arhitektury sovremennyh sistem zashchity / M.V. Bujnevich [i dr.] // Nacional'naya bezopasnost' i strategicheskoe planirovanie. 2020. № 3 (31). S. 51–58. DOI:https://doi.org/10.37468/2307-1400-2020-3-51-58.
9. Eryshov V.G., Ilina D.V. Model of the Integrated System of Protection of Information Systems of the Organization // The proceedings of Wave Electronics and its Application in Information and Telecommunication Systems. Saint-Petersburg, 2021. P. 1–4. DOI:https://doi.org/10.1109/WECONF51603.2021.9470711.
10. Bujnevich M.V., Moiseenko G.Yu. Kombinirovanie raznorodnyh destruktivnyh vozdejstvij na informacionnuyu sistemu i protivodejstvie atakam (na primere insajderskoj deyatel'nosti i DDOS-ataki) // Informacionnye tekhnologii i telekommunikacii. 2023. T. 11. № 3. S. 27–36. DOI:https://doi.org/10.31854/2307-1303-2023-11-3-27-36.
11. Leonov N.V. Protivodejstvie uyazvimostyam programmnogo obespecheniya. Chast' 1. Ontologicheskaya model' // Voprosy kiberbezopasnosti. 2024. № 2 (60). S. 87–92. DOI:https://doi.org/10.21681/2311-3456-2024-2-87-92.
12. Leonov N.V. Protivodejstvie uyazvimostyam programmnogo obespecheniya. Chast' 2. Analiticheskaya model' i konceptual'nye resheniya // Voprosy kiberbezopasnosti. 2024. № 3 (61). S. 90–95. DOI:https://doi.org/10.21681/2311-3456-2024-3-90-95.
13. Yuan Q., Ma W. Research on Computer Network Information Security Strategy under the Background of Big Data // Networking, informatics and computing: the proceedings of international conference. Palermo, 2023. P. 214–218. DOI:https://doi.org/10.1109/ICNETIC59568.2023.00051.
14. Vlasov D.S. K voprosu o priznakah insajderskoj deyatel'nosti // Nacional'naya bezopasnost' i strategicheskoe planirovanie. 2024. № 1 (45). S. 35–45. DOI:https://doi.org/10.37468/2307-1400-2024-1-35-45.
15. White E.F.R., Dhillon G. Synthesizing Information System Design Ideals to Overcome Developmental Duality in Securing Information Systems // System Sciences: the proceedings of 38th annual hawaii international conference. Big Island, USA, 2005. P. 186a–186a. DOI:https://doi.org/10.1109/HICSS.2005.572.
16. Nekrasov A.V., Kalach A.V., Isaev A.A. Ideal'noe modelirovanie – osnova sovershenstvovaniya sistemy protivopozharnoj zashchity predpriyatij // Pozharovzryvobezopasnost'. 2011. T. 20. № 9. S. 31–34.
17. Kurta P.A. Effektivnostnaya model' interfejsa vzaimodejstviya pol'zovatelya s informacionnym servisom zaprosnogo tipa // Trudy uchebnyh zavedenij svyazi. 2023. T. 9. № 6. S. 102–115. DOI:https://doi.org/10.31854/1813-324X-2023-9-6-102-115.
18. Aristova D.A., Makeeva E.Z., Fedorova O.V. Integral'nyj pokazatel' effektivnosti pri ocenke proektov v transportnoj otrasli // Ekonomika zheleznyh dorog. 2022. № 4. S. 38–44.
19. Kriterij postroeniya i strategiya funkcionirovaniya informacionno-telekommunikacionnoj sistemy s zashchitoj ot destruktivnyh vozdejstvij / M.V. Knysh [i dr.] // Naukoemkie tekhnologii. 2024. T. 25. № 5. S. 5–15. DOI:https://doi.org/10.18127/j19998465-202405-01.
20. Budakov V.I., Kal'chenko D.V., Koroleva T.M. K voprosu ob operativnosti reagirovaniya na chrezvychajnye situacii // Problemy bezopasnosti i chrezvychajnyh situacij. 2013. № 6. S. 130–135.
21. Makarov O.Yu., Rogozin E.A., Hvostov V.A. Matematicheskaya model' obosnovaniya trebovanij k pokazatelyu resursoemkosti sistem zashchity informacii ot nesankcionirovannogo dostupa // Vestnik Voronezhskogo gosudarstvennogo tekhnicheskogo universiteta. 2007. T. 3. № 4. S. 102–104.
22. Hubaev G.N. Ekspertnaya ocenka vesov pokazatelej: variant realizacii // Voprosy ekonomicheskih nauk. 2008. № 5 (33). S. 134–136.
23. Informacionnaya bezopasnost' informacionnyh sistem s elementami centralizacii i decentralizacii / S.V. Kruglikov [i dr.] // Voprosy kiberbezopasnosti. 2020. № 1 (35). S. 2–7. DOI:https://doi.org/10.21681/2311-3456-2020-01-02-07.
24. Yaroshenko A.Yu. Intellektual'nyj metod resheniya zadachi ranzhirovaniya trebovanijpo informacionnoj bezopasnosti v organizacionnoj sisteme ee obespecheniya // Avtomatizaciya v promyshlennosti. 2024. № 12. S. 47–52. DOI:https://doi.org/10.25728/avtprom.2024.12.10.
25. Vitenburg E., Nikishova A. Project of Automated System\'s Information Security System Selection // EastConf: the proceedings of international science and technology conference. Vladivostok, 2019. P. 1–5. DOI:https://doi.org/10.1109/EastConf.2019.8725345.




