ADMINISTRATION OF A SYSTEM FOR INFORMATION SECURITY SYSTEM FOR ELECTION AND FACILITATION OF THE PROTECTION MEASURES FOR INFORMATION IN THE POWER BODIES UNDER THE APPLICATION OF THE AGRICULTURAL ARRANGEMENTS OF THE GAME THEORY
Abstract and keywords
Abstract:
The article deals with the issue of managing the information security system through the selection and formation of an optimal set of means of protecting the object of informatization. To solve this problem, the use of game theory algorithms is proposed, payment matrices of which are reduced to modeling conflict situations and choosing optimal strategies based on Bayes criteria, Valda, Hurwitz and Laplace. An example of the application of these criteria for the selection of strategies, based on the results of the analysis of statistical material on current cyber threats and the probabilities of their reflection by various means of protecting the object of informatization, which allows to provide the necessary level of information security in the structural units of law enforcement agencies

Keywords:
information security, mathematical methods, game theory, wald and hurwitz criteria
Text
Text (RU) (PDF): Read Download
References

1. Direktiva Rosgvardii ot 28 oktyabrya 2021 g. No D-2 "O prioritetnyh napravleniyah deyatel'nosti voysk nacional'noy gvardii Rossiyskoy Federacii v 2022 godu" // Sayt Rosgvardii. URL: https://rosguard.gov.ru/ (data obrascheniya: 28.09.2023).

2. Voronov S.A., Ushakov M.V., Chernyh A.K. Perspektivy sovershenstvovaniya professional'noy podgotovki voennosluzhaschih i sotrudnikov k formirovaniyu gotovnosti (ustoychivosti) k informacionnomu vozdeystviyu destruktivnyh sil / Nauchnye trudy Severo-Zapadnogo upravleniya RANHiGS, 2022, T 13, No 2 (54). S. 13-21.

3. Voronov S.A. O formiruemyh professional'nyh kompetenciy l/s pravoohranitel'nyh organov v sfere informacionnogo protivoborstva / Moral'no-psihologicheskoe obespechenie deyatel'nosti organov vnutrennih del: sovremennye podhody i perspektivy razvitiya [Elektronnyy resurs]: materialy vserossiyskoy nauchno-prakticheskoy konferencii, 15.12.2021. - SPb.: SPb Universitet MVD Rossii, 2021. S. 28-31. EDN: https://elibrary.ru/COGFIH

4. Doktrina informacionnoy bezopasnosti Rossiyskoy Federacii // URL: https://rg.ru/documents/2016/12/06/doktrina-infobezobasnost-site-dok.html (data obrascheniya: 09.10.2023).

5. Basarab M.A. Teoriya igr v informacionnoy bezopasnosti: uchebno-metodicheskoe posobie / M.A. Basarab, N.S. Konnova. - Moskva: MGTU im. N.E. Baumana, 2019. - 80 s. // URL: https://ibooks.ru/bookshelf/374903/reading (data obrascheniya: 28.09.2023). EDN: https://elibrary.ru/FYPBUJ

6. Viksnin I.I., Marinenkov E.D., Chuprov S.S. Primenenie teorii igr dlya obespecheniya bezopasnosti kommunikacii kiberfizicheskoy sistemy s ispol'zovaniem mehanizmov reputacii i doveriya // Nauchno-tehnicheskiy vestnik informacionnyh tehnologiy, mehaniki i optiki. 2022. T. 22, No 1. S. 47-59. EDN: https://elibrary.ru/PSNOAJ DOI: https://doi.org/10.17586/2226-1494-2022-22-1-47-59

7. Alpcan T., Başar T. Network Security: A Decision and Game Theoretic Approach. Cambridge University Press, 2010. // URL: https://dl.acm.org/doi/book/ (data obrascheniya: 28.09.2023). DOI:https://doi.org/10.5555/1951874

8. Lavrent'ev A.V., Zyazin V.P. O primenenii metodov teorii igr dlya resheniya zadach komp'yuternoy bezopasnosti // Bezopasnost' informacionnyh tehnologiy: elektron. nauch. zhurn. 2013. No 3. URL: https://bit.mephi.ru/index.php/bit/article/view/312 (data obrascheniya: 28.09.2023).

9. Vahniy T.V., Guc A.K., Novikov N.Yu. Matrichno-igrovaya programma s vyborom kriteriya dlya optimal'nogo nabora sredstv zaschity komp'yuternoy sistemy // Matematicheskie struktury i modelirovanie. 2016. No 2 (38). S. 103-115. EDN: https://elibrary.ru/WDEGNB

10. Vahniy T.V., Guc A.K., Bondar' S.S. Uchet veroyatnostey hakerskih atak v igrovom podhode k podboru programmnyh sredstv zaschity komp'yuternoy informacii // Matematicheskie struktury i modelirovanie. 2015. No 3 (35). S. 91-105. EDN: https://elibrary.ru/VCYIPJ

11. Aktual'nye kiberugrozy: itogi 2022 goda // URL: https://www.ptsecurity.com/ru-ru/research/analytics/cybersecurity-threatscape-2022/#id1 (data obrascheniya: 28.09.2023).

12. Chislo kiberatak na informacionnye sistemy Rossii vyroslo na 65%. URL: https://www.vedomosti.ru/technology/news/2023/03/03/965181-chislo-kiberatak (data obrascheniya: 28.09.2023).

13. Osnovnye metody i sposoby zaschity informacii. URL: https://itsec2012.ru/osnovnye-metody-i-sposoby-zashchity-informacii (data obrascheniya: 28.09.2023).

14. On-line kal'kulyator dlya rascheta kriteriev v teorii igr. URL: https://math.semestr.ru/games/horowitz.php (data obrascheniya: 28.09.2023).

Login or Create
* Forgot password?