Design method and evaluation of the working single technical protection information on the selected direction of hacking

Authors

  • Борис Евгеньевич Журиленко National Aviation University

DOI:

https://doi.org/10.18372/2410-7840.21.13950

Keywords:

single technical information protection, protection design, probability break-in probability distribution surface, break-in probability maximum distribution surface

Abstract

This paper shows an alternative to the known methods, the ability to design and evaluate a single technical information protection (TZI) in the chosen direction of hacking. Namely, the possibility of constructing a TZI according to the selected parameters: the direction and the necessary attempt to hack or the necessary selected attempt and its time to hack is shown. Using the proposed method for designing and evaluating a single TZI according to the selected parameters of hacking, one can obtain the distribution surface of the probability of breaking into the protection and the distribution surface of the maximums of the probability of breaking, the effectiveness of the chosen protection, the necessary financing for this type of protection, the risks of investment losses and risks of general financial losses. The obtained parameters of information protection can be compared with the required design parameters and determine their compliance with the specified TZI. In case of non-compliance with the requirements of the technical specifications, it is necessary to choose a different type of protection and use this method to calculate new protection parameters. When assessing a working TZI, according to the real, experimentally recorded, direction of hacking and the designed TZI, it is possible to determine the probabilistic reliability of a single working defense, as well as at what attempt and time its real physical hacking is possible. Based on the results of the analysis of the state of the working TZI, a decision is made to extend the work, replace or modernize the existing information protection. The paper presents a calculation method with specific selected parameters for designing and evaluating a single TZI in the chosen direction of hacking. Charts have been built for specific protection and hacking parameters, with the help of which the possible attempt and time of this attempt to break the TZI have been determined. Using a graphic illustration shows the physical process of hacking information protection.

Author Biography

Борис Евгеньевич Журиленко, National Aviation University

Candidate of Physical and Mathematical Sciences, assistant professor of automation and energy management of the National Aviation University

References

Б. Журиленко, "Методология построения и анализа состояния комплекса технической защиты

информации с вероятностной надежностью и

учетом временных попыток взлома", Захист інформації, №3(17), С. 196-203, 2015.

Б. Журиленко, Н. Николаева, "Определение

коэффициента эффективности технической защиты информации по ее параметрам", Безпека інформації, №3(21), С. 245-250, 2015.

Б. Журиленко, Н. Николаева, Н. Пелих, "Оценка

стойкости технической защиты информации во

времени", Захист інформації, №1(54), С. 104-108,

Б. Журиленко, "Метод проектирования единичной системы технической защиты информации с

вероятностной надежностью и заданными параметрами взлома", Безпека інформації, №1(20), С. 36-

, 2014.

Б. Журиленко, "Определение вероятностной надежности единичной технической защиты информации из реальных попыток взлома", Безпека

інформації, №1(19), С. 34-39, 2013.

Б. Журиленко, "Оценивание финансовых затрат

на построение системы защиты информации", Захист інформації, № 4(20), С. 231-239, 2018. DOI:

18372/2410-7840.20.13424.

Б. Журиленко, Н. Николаева, "Вероятностная надежность защиты информации в зависимости от направления взлома", Захист інформації, №3(20),

С. 174-179, 2018. DOI: 10.18372/2410-7840.20.13073.

Б. Журиленко, Моделирование процесса взлома

и анализа рабочего состояния технической защиты информации, Безпека інформації, №1(22),

С. 26-31, 2016.

Published

2019-09-27

Issue

Section

Articles