CLASSIFICATION OF THREATS TO STATE INFORMATIVE RESOURCES OF NORMATIVELY-LEGAL ASPIRATION. METHODOLOGY OF CONSTRUCTION OF CLASSIFIER

Authors

  • Олександр Костянтинович Юдін National Aviation University
  • Сергій Степанович Бучик Zhitomir Military Institute of the name of S.P. Korolyova of the State University of Telecommunications

DOI:

https://doi.org/10.18372/2410-7840.17.8759

Keywords:

state informative resources, classifier of threats, threat, normatively-legal aspiration, confidentiality, integrity, availability.

Abstract

In the article the analysis of their last researches and publicationson the subjects of construction of methodologyof classifier of threats of state informative resources generalizedby the authors is conducted. It is indicated thatthe method of «double three of security» offered by authorsis the fundamental for forming of «Classifier ofthreats of state informative resources» which is formed onthe basis of the two platforms of security. The first platformof informative safety consists of elements which aresubject to security (properties of information): confidentiality;integrity; availability. The second platform of informativesafety consists of components which realize thesystem of security (methods and facilities): normativelylegal;organizational; technical. The place of threats ofstate informative resources of normatively-legal aspirationin the general system of classifier is shown. Clarificationof semantics of classifier taking into account division ofthreats into strategic and tactical is carried out. Strategicthreats concern the questions of national security, absenceor non-fulfillment of the special purpose programs ordoctrines, weakening of branch intercommunications oforgans of state and legislative power and others like that.Tactical threats directed to the informative systems oftreatment, storage and transmission of state informativeresources. Certain threats of normatively-legal aspirationwith taken into account experience of the authors, existentnormatively-legal base and other information sourcesare defined. For the realization of further codificationevery threat is attributed to the certain parameters: accordingthe source of threat; in relation to informationholding object; by the nature of threats; by the structureof influence; by the level of influence. The ways of furtherresearches which must be aimed at determination ofthreats of organizational and technical character are set.Directions of further researches are set, the necessity offurther perfection of normative base with the purpose ofsecurity of state informative resources is indicated on.

Author Biographies

Олександр Костянтинович Юдін, National Aviation University

Dr. of Engineering, professor. Memberof expert and scientifically-methodical advice of Departmentof education and science of Ukraine in an area«Information security». Corresponding member of Academyof Connection of Ukraine. Laureate of the Statebonus of Ukraine in area of SciTech. Director of instituteof computer information technologies, manager by thedepartment of the computerized systems for informationthe National Aviation University.

Сергій Степанович Бучик, Zhitomir Military Institute of the name of S.P. Korolyova of the State University of Telecommunications

PhD in Eng., chief of department ofautomated control the system the Zhitomir Military Instituteof the name of S.P. Korolyova of the State Universityof Telecommunications.

References

Юдін О.К. Правові аспекти формування системи державних інформаційних ресурсів / О.К. Юдін, С.С. Бучик // Безпека інформації. – 2014. – Том 20 (1). – С. 76-82.

Юдін О.К. Методологія побудови класифікатора загроз державним інформаційним ресурсам / С. Бучик, А. Чунарьова, О. Варченко // Наукоємні технології. – 2014. – №2 (22). – С. 200-210.

Юдін О.К. Загрози державним інформаційним ресурсам: терміни та визначення / С.С. Бучик, О.К. Юдін // Захист інформації. – 2014. – Том 16 (2). – С. 121-125.

Богуш В.М. Інформаційна безпека держави / О.К. Юдін. – К.: “МК-Прес”, 2005. – 432 с.

Юдін О.К. Інформаційна безпека. Нормативно-правове забезпечення: підруч. / О.К. Юдін. – К.: НАУ, 2011. – 640 с.

The analysis of normatively-legal providing of defence of state informative resources in informatiоn–telecommunication systems / О. Yudin, S. Buchyk // Science-based technologies. – 2013. – №2 (18). – P. 202-206.

Юдін О.К. Концептуальний аналіз уразливості державних інформаційних ресурсів / О.К. Юдін, С.С. Бучик // Наукоємні технології. – 2013. – №3 (19). – С. 299–304.

Юдін О.К. Аналіз загроз державним інформаційним ресурсам / О.К. Юдін, С.С. Бучик // Проблеми інформатизації та управління. – 2013. – №4 (44). – С. 93-99.

Yudin О., Buchyk S. (2014) "Legal aspects of the state information resources system formation", Bezpeka ìnformacìì, №20 (1), P. 76-82.

Yudin О., Buchyk S., A. Chunarevа, O. Frolov (2014) "Methodology of construction of classifier of threats to the state informative resources", Science-based technologies, №2 (22), P. 200-210.

Yudin О., Buchyk S. (2014) "Threat state informative resources. Terms and determinations", Zahist ìnformacìï, №16 (2), P. 121-125.

Bogush V., Yudin A. (2005) "Information security of the state", K.: MK-Press, 432 p.

Yudin O.K.. (2011) "Informative security. Normatively legal providing", K.: NAU, 640 p.

Yudin О., Buchyk S. (2013) "The analysis of normatively–legal providing of defence of state informative resources in informatiоn telecommunication systems", Science-based technologies, №2 (18), P. 202-206.

Yudin О., Buchyk S. (2013) "The conceptual analysis of vulnerability of state informative resources is conducted", Science-based technologies, №3 (19), P. 299-304.

Yudin О., Buchyk S. (2013) "Analysis of threats to the state informative resources", Problems of informatization and management, №4 (44), Engineering sciences, P. 93-99.

Published

2015-06-08

Issue

Section

Articles