Reviewed and analyzed ways to secure information interaction of the various elements of the computer network. Based on this analysis, the proposed method and algorithm implementation to justify rational variant of interaction resources according to the criterion of information security.
automation, information security, method, concessions, algorithm
1. O edinoy gosudarstvennoy sisteme preduprezhdeniya i likvidacii ChS: Postanovlenie Pravitel'stva Ros. Federacii ot 30 dek. 2003 g. № 794. Dostup iz inform.-pravovogo portala «Garant».
2. Artamonov V.S., Kadulin V.E., Kozlenko R.N. Informacionnoe obespechenie gosudarstvennoy pozharno-spasatel'noy sluzhby v usloviyah chrezvychaynyh situaciy // Vestnik S.-Peterb. in-ta GPS MChS Rossii. 2003. № 3.
3. Podinovskiy V.V., Gavrilov V.M. Optimizaciya po posledovatel'no primenyaemym kriteriyam. M.: Sov. radio, 1975. 192 s.
4. Sineschuk Yu.I., Terehin S.N., Smirnov A.S. Bezopasnost' informacionnyh sistem i zaschita informacii v MChS Rossii: ucheb. posobie. SPb.: S.-Peterb. un-t GPS MChS Rossii, 2012. 256 s.
5. O sovershenstvovanii informacionno-telekommunikacionnogo obespecheniya organov gosudarstvennoy vlasti i poryadke ih vzaimodeystviya pri realizacii gosudarstvennoy politiki v sfere informatizacii: Ukaz Prezidenta Ros. Federacii ot 1 iyulya 1994 g. № 1390. Dostup iz sprav.-pravovoy sistemy «Konsul'tantPlyus».