MODELS OF OPTIMAL FUEL FUNCTIONING OF REMOTE ACCESS SECURITY IN INFOR-MATION NETWORKS
DOI:
https://doi.org/10.18372/2225-5036.27.16513Keywords:
information networks, remote access, optimal security functioning, information networks security, information securityAbstract
The article considers a number of security modules in information networks, which allows to optimally regulate access to the local information network from external networks in terms of information security; the numerical values of the possibilities of unauthorized access to this type of connection, selected taking into account the obtained data, for the optimal choice of security mechanisms are determined. The article considers a number of security modules in information networks, which allows to optimally regulate access to the local information network from external networks in terms of information security; the numerical values of the possibilities of unauthorized access to this type of connection, selected taking into account the obtained data, for the optimal choice of security mechanisms are determined. The article considers a number of security modules in information networks, which allows to optimally regulate access to the local information network from external networks in terms of information security; the numerical values of the possibilities of unauthorized access to this type of connection, selected taking into account the obtained data, for the optimal choice of security mechanisms are determined.