Structural model of the DSS for the State Examination of the IISS
DOI:
https://doi.org/10.18372/2225-5036.26.14666Keywords:
IISS state examinations, functional security profile, decision support system, ND TPI 2.5-004-99, expert reviewAbstract
Abstract. The process of conducting state examinations of integrated information security systems (IISS) and the organization of electronic circulation of documents created at the stage of design work have a number of problems, namely: the vulnerability of information stored on permanent storage media; greater entropy of information uncertainty, increases the risks of expert errors in conducting state examinations of IISS; the problem of handling paper documents that were created at the pre-design stage increases the risks of information disclosure with limited access. To solve these problems, it is necessary to automate individual processes. The goal is carried out by developing a structural model of a decision support system (DSS) for the implementation of IISS examinations, which is formed from interconnected databases of semantic variables, a variety of criteria and document templates, as well as modules for extracting semantic variables, identifying a functional defense profile and interacting with an expert. To implement the structural model, a software application was developed that supports two main processes: the first is to verify the compliance of the functional security profile (FSP) with the requirements of the ND TPI; the second is focused on extracting semantic variables from incoming documents and storing them in a database of semantic variables (DBSV). These solutions allow you to expand the functionality of modern DSS related to the implementation of examinations of technical protection of information. Thus, a structural model of DSS was proposed, which due to interconnected DBSV, set of criteria and templates of documents as well as modules for separating semantic variables, identification of FSP and interaction with the expert allows to expand the functionality of modern DSS related with the implementation of examinations of technical protection of information.
References
О. Корченко, А. Давиденко, М. Шабан, "Модель параметрів для ідентифікації функціональ-ного профілю захисту в комп’ютерних системах", Безпека інформації, Том 25, №2, С. 122-126, 2019.
А. Давиденко, М. Шабан, О. Корченко, І. Іванченко, "Метод ідентифікації функціонального профілю захисту", Захист інформації, Том 21, №4, С. 251-258, 2019.
О. Корченко, А. Давиденко, М. Шабан, "Декомпозиційна модель представлення смислових констант та змінних для реалізації експертиз у сфері ТЗІ", Захист інформації, Том 21, №2, С. 88-96, 2019.
НД ТЗІ 2.5-004-99 Критерії оцінки захи-щеності інформації в комп’ютерних системах від несанкціонованого доступу, затверджений наказом Департаменту спеціальних телекомунікаційних сис-тем та захисту інформації СБ України від 28.04.99 р. № 22.