ASSESSMENT OF DESIGNED AND OPERATING TECHNICAL PROTECTION OF INFORMATION USING A MATHEMATICAL MODEL OF THE REAL PHYSICAL PROCESS OF HACKING PROTECTION
DOI:
https://doi.org/10.18372/2410-7840.23.16769Keywords:
technical information security, hacking probability distribution, mathematical model of a real physical process of security cracking, Poisson distribution, probability distribution of possible hacking, real hacking process, hacking direction lineAbstract
This paper shows the possibility of assessing the designed and operating technical information security (TIS) using a mathematical model of the real physical process of breaking the protection according to the experimentally obtained attempts and the time of these attempts to break. Evaluation of multi-level operating technical information protection is carried out through an equivalent single-level protection, which can be compared with the equivalent projected multi-level protection and determine its effectiveness. To obtain all the parameters of an effective single-level mathematical model of the real process of breaking TIS, at least three real attempts and their time of breaking the protection are required. Usually protection after hacking is not used, but the hacking parameters become known. If we obtain the data of three attempts to hack TIS with the same parameters of the used information protection, then it is possible to calculate all the necessary parameters of the equivalent one-level protection determined by the mathematical model of the real physical process of hacking. Since, in the open press, there are no experimental results of the study of the process of cracking technical protection, the following model was used to determine the parameters of the investigated TIS. We calculated the probability of hacking with known initial hacking parameters and built a one-level protection, from which we determined three attempts and their time of hacking, the direction of the hacking process, the intensity of hacking attempts and other data that can be determined from the real hacking process. With the help of these data, the inverse problem was solved and all unknown parameters of the investigated TIS were obtained, with a sufficiently high accuracy, coinciding with the initial data laid down in the model when designing the protection.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).