Sequential two-level information protection with probability reliability
DOI:
https://doi.org/10.18372/2410-7840.22.14660Keywords:
technical information protection, equivalent one-level protection, sequential two-level information protection with probabilistic hacking, distribution of the maximum probability of hacking, distribution of the probability of hackingAbstract
In this work, theoretical studies of the physical hacking process for sequential two-level technical protection of information (TPI) with probabilistic reliability are carried out. The research uses an approach related to the reliability of various equipment, technical devices and systems, which have been studied in sufficient detail and have provided good practical results with a quantitative probabilistic assessment. To calculate and evaluate the possibilities of sequential two-level technical information protection, we used single-level TPI with probabilistic reliability, proposed and considered in the works of B. Zhurilenko. In this work, we used the method of constructing a consistent two-level technical protection of information with probabilistic reliability and the possibility of comparing it with equivalent single-level protection. Such a comparison can be useful in assessing and comparing multilevel TPI, since such an approach will make possible evaluation of different structures of multilevel protection systems and it is quite simple to compare the designed and existing TPI from a uniform point of view. Studies have shown that the distribution surface of the maximum probabilities of breaking into an equivalent single-level TPI does not completely coincide with the distribution of the probability maxima of breaking into a two-level TPI. Therefore, protection comparisons are only possible in the hacking direction selected for analysis. To analyze and compare the security of information in other directions, it is necessary to calculate and construct the distribution of the maximum probabilities of breaking for these directions using the proposed methodology. The paper proposes a method for determining the real probability of breaking a two-level protection not by the maximum value of the probability of breaking, but by the distribution of the probability of breaking a sequential two-level TPI, since breaking of TPI may not necessarily occur at the maximum values of the probability of breaking. In this case, based on the constructed surfaces of the probabilities of breaking, the real reliability of the TPI can be determined for any direction of breaking.
References
Л. Румшинский, Элементы теории вероятностей, М.: Изд-во «Наука», Главн. Ред. Физ.-мат. Лит., 1970, 256 с.
Б. Журиленко, "Метод проектирования и оценка работающей одиночной технической защиты информации по выбранному направлению взлома", Захист інформації, №3(21), С. 143-149, 2019. DOI: 10.18372/2410-7840.21.13950.
В. Васянин, Б. Журиленко, Н. Николаева, Информационные управляющие системы и технологии. Проблемы и решения: монография, авт. кол.: [и др.]; под науч. ред. проф. В.Вычужанина, Одесса: Экология, С. 60-73, 2019.
Б. Журиленко, "Метод проектирования единичной системы технической защиты информации с вероятностной надежностью и заданными параметрами взлома", Безпека інформації, №1(20), С. 36-42, 2014.
Б. Журиленко, "Оценивание финансовых затрат на построение системы защиты информации", Захист інформації, №4(20), С. 231-239, 2018. DOI: 10.18372/ 2410-7840.20.13424.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).