CLASSIFICATION OF THREATS TO STATE INFORMATIVE RESOURCES OF NORMATIVELY-LEGAL ASPIRATION. METHODOLOGY OF CONSTRUCTION OF CLASSIFIER
DOI:
https://doi.org/10.18372/2410-7840.17.8759Keywords:
state informative resources, classifier of threats, threat, normatively-legal aspiration, confidentiality, integrity, availability.Abstract
In the article the analysis of their last researches and publicationson the subjects of construction of methodologyof classifier of threats of state informative resources generalizedby the authors is conducted. It is indicated thatthe method of «double three of security» offered by authorsis the fundamental for forming of «Classifier ofthreats of state informative resources» which is formed onthe basis of the two platforms of security. The first platformof informative safety consists of elements which aresubject to security (properties of information): confidentiality;integrity; availability. The second platform of informativesafety consists of components which realize thesystem of security (methods and facilities): normativelylegal;organizational; technical. The place of threats ofstate informative resources of normatively-legal aspirationin the general system of classifier is shown. Clarificationof semantics of classifier taking into account division ofthreats into strategic and tactical is carried out. Strategicthreats concern the questions of national security, absenceor non-fulfillment of the special purpose programs ordoctrines, weakening of branch intercommunications oforgans of state and legislative power and others like that.Tactical threats directed to the informative systems oftreatment, storage and transmission of state informativeresources. Certain threats of normatively-legal aspirationwith taken into account experience of the authors, existentnormatively-legal base and other information sourcesare defined. For the realization of further codificationevery threat is attributed to the certain parameters: accordingthe source of threat; in relation to informationholding object; by the nature of threats; by the structureof influence; by the level of influence. The ways of furtherresearches which must be aimed at determination ofthreats of organizational and technical character are set.Directions of further researches are set, the necessity offurther perfection of normative base with the purpose ofsecurity of state informative resources is indicated on.References
Юдін О.К. Правові аспекти формування системи державних інформаційних ресурсів / О.К. Юдін, С.С. Бучик // Безпека інформації. – 2014. – Том 20 (1). – С. 76-82.
Юдін О.К. Методологія побудови класифікатора загроз державним інформаційним ресурсам / С. Бучик, А. Чунарьова, О. Варченко // Наукоємні технології. – 2014. – №2 (22). – С. 200-210.
Юдін О.К. Загрози державним інформаційним ресурсам: терміни та визначення / С.С. Бучик, О.К. Юдін // Захист інформації. – 2014. – Том 16 (2). – С. 121-125.
Богуш В.М. Інформаційна безпека держави / О.К. Юдін. – К.: “МК-Прес”, 2005. – 432 с.
Юдін О.К. Інформаційна безпека. Нормативно-правове забезпечення: підруч. / О.К. Юдін. – К.: НАУ, 2011. – 640 с.
The analysis of normatively-legal providing of defence of state informative resources in informatiоn–telecommunication systems / О. Yudin, S. Buchyk // Science-based technologies. – 2013. – №2 (18). – P. 202-206.
Юдін О.К. Концептуальний аналіз уразливості державних інформаційних ресурсів / О.К. Юдін, С.С. Бучик // Наукоємні технології. – 2013. – №3 (19). – С. 299–304.
Юдін О.К. Аналіз загроз державним інформаційним ресурсам / О.К. Юдін, С.С. Бучик // Проблеми інформатизації та управління. – 2013. – №4 (44). – С. 93-99.
Yudin О., Buchyk S. (2014) "Legal aspects of the state information resources system formation", Bezpeka ìnformacìì, №20 (1), P. 76-82.
Yudin О., Buchyk S., A. Chunarevа, O. Frolov (2014) "Methodology of construction of classifier of threats to the state informative resources", Science-based technologies, №2 (22), P. 200-210.
Yudin О., Buchyk S. (2014) "Threat state informative resources. Terms and determinations", Zahist ìnformacìï, №16 (2), P. 121-125.
Bogush V., Yudin A. (2005) "Information security of the state", K.: MK-Press, 432 p.
Yudin O.K.. (2011) "Informative security. Normatively legal providing", K.: NAU, 640 p.
Yudin О., Buchyk S. (2013) "The analysis of normatively–legal providing of defence of state informative resources in informatiоn telecommunication systems", Science-based technologies, №2 (18), P. 202-206.
Yudin О., Buchyk S. (2013) "The conceptual analysis of vulnerability of state informative resources is conducted", Science-based technologies, №3 (19), P. 299-304.
Yudin О., Buchyk S. (2013) "Analysis of threats to the state informative resources", Problems of informatization and management, №4 (44), Engineering sciences, P. 93-99.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).