MODELS OF OPTIMAL FUEL FUNCTIONING OF REMOTE ACCESS SECURITY IN INFOR-MATION NETWORKS

Authors

DOI:

https://doi.org/10.18372/2225-5036.27.16513

Keywords:

information networks, remote access, optimal security functioning, information networks security, information security

Abstract

The article considers a number of security modules in information networks, which allows to optimally regulate access to the local information network from external networks in terms of information security; the numerical values of the possibilities of unauthorized access to this type of connection, selected taking into account the obtained data, for the optimal choice of security mechanisms are determined. The article considers a number of security modules in information networks, which allows to optimally regulate access to the local information network from external networks in terms of information security; the numerical values of the possibilities of unauthorized access to this type of connection, selected taking into account the obtained data, for the optimal choice of security mechanisms are determined. The article considers a number of security modules in information networks, which allows to optimally regulate access to the local information network from external networks in terms of information security; the numerical values of the possibilities of unauthorized access to this type of connection, selected taking into account the obtained data, for the optimal choice of security mechanisms are determined.

Published

2022-05-26

Issue

Section

Network & Internet Security