Рассмотрена методика обоснования рационального количества резервных каналов связи в информационно-телекоммуникационной сети ИТКС. Сформулирована задача определения структуры резервных каналов. Определены условия оптимального выбора каналов из множества допустимых. Приведен пример решения задачи безотказной работы ИТКС. Разработана методика решения комплексной задачи структурного резервирования ИТКС. A method of substantiating a rational number of backup communication channels in the information and telecommunications network (ITCN) is considered. The problem of determining the structure of backup channels is formulated. An example of solving the problem of failure-free operation of ITCN is given. A method for solving the complex problem of structural redundancy of the ITCN has been developed.
The main trend in recent years is the shift of emphasis from mass attacks to targeted (target) attacks, which are the actions of the enemy of a particular state or non-state structure in advance. The target attack is always built under the object of influence, being a thoughtful operation, not a simple technical action. Target cyber attack on the element of information and telecommunication network is implemented in the form of a set of activities aimed at studying the information system and software. This allows for revealing weaknesses in the structure of the information and telecommunication network. The authors develop the technique of hidden introduction and bypass of standard means of information protection, fix the infrastructure, distribute the harmful action. Under the impact of a targeted cyber attack, it is difficult to choose the methods and means of protecting the information and telecommunication network, as their resource is limited. One of the ways to resolve this contradiction is a differentiated approach to the protection of information and telecommunication network, which is to choose the most relevant for the current situation areas of protection. The article deals with the problem of targeted attacks proliferation and describes the principle of their realization. The authors also substantiate the need of working out the methodology for estimating the impact of targeted cyber attacks by the enemy on information and telecommunications networks as well as their key elements. The special attention is paid to the purpose and structure of this methodology. The authors describe the stages of targeted cyber attack and its application areas.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.