A DETAILED ALGORITHM OF A PLURALITY OF IMPLEMENTATIONS OF INFORMATION SECURITY THREATS IN THE MEDICAL INFORMATION SYSTEM
Abstract and keywords
Abstract (English):
The article presents a detailed algorithm for implementing information security threats to information resources health information systems used in the processing of personal data. The proposed algorithm is developed in relation to the problems of justification of requirements to information security, contains verbal and statistical description of the basic stages of realization of threats. The algorithm is based on the results of statistical processing of experimental records the digital stream to the standard conditions using specialized software analysis tools. The authors offer a list of registered signs for recognition of threats to information security in the digital stream. The technique of the experimental analysis of statistical characteristics of realizations of information safety threats consists of following stages: recording the digital data stream segment local area network that implements information security representative for a period of time, recognition of the types of implementations of information security threats on the grounds of IP packets. The detailed algorithm is designed to develop a predictive "picture of state of nature, which is source data of the normalization procedure of requirements for information security methods of decision making. To formalize multivariate nature of the implementations of information security threats, the authors propose a method of constructing formal models using logical attack trees with the assignment of the arcs of the tree of the numerical coefficients that have a temporal meaning.

Keywords:
information safety, protection model, criterion of efficiency.
References

1. GOST R ISO/MEK 15408-2002. Informatsionnaya tekhnologiya. Metody i sredstva obespecheniya bezopasnosti. Kriterii otsenki bezopasnosti informatsionnykh tekhnologiy. M.: IPK Izdatel´stvo standartov, 2002.

2. Makarov O.Yu., Khvostov V.A., Khvostova N.V. Metodika normirovaniya trebovaniy k informatsionnoy bezopasnosti avtomatizirovannykh sistem. Vestnik Voronezhskogo gosudarstvennogo tekhnicheskogo universiteta. 2010. T.6, №11. S. 47-51.

3. Metody i sredstva povysheniya zashchishchennosti avtomatizirovannykh sistem: monografiya / Khvostov V.A. [i dr.]; pod obshch.red. d-ra tekhn. nauk, prof. S.V. Skrylya i d-ra tekhn. nauk, prof. E.A. Rogozina Voronezh: Voronezhskiy institut MVD Rossii, 2013. 108 s.

4. Kislyak A.A., Makarov O.Yu., Rogozin E.A., Khvostov V.A. Metodika otsenki veroyatnosti nesanktsionirovannogo dostupa v avtomatizirovannye sistemy, ispol´zuyushchie protokol TCP/IP. Informatsiya i bezopasnost´. 2009. T. 12, №2. S. 285-288.

5. Kislyak A.A., Makarov O.Yu., Rogozin E.A., Khvostov V.A. Ob odnom sposobe formalizatsii ponyatiya stoykosti funktsii bezopasnosti GOST ISO/MEK 15408. Vestnik Voronezhskogo gosudarstvennogo tekhnicheskogo universiteta. 2009. T.5, №2 S. 94-98.

Login or Create
* Forgot password?