The paper presents a mathematical model of functioning of the system of information protection (IPS) from unauthorized access (UA) in automated systems (AS). This model was developed in framework of the CPN Tools software environment. For convenience, visibility and preservation of logical integrity, the model is divided into subsystems using the tools built into CPN Tools. The model is necessary for a computational experiment, namely, to study the real consumer properties of IPS from UA in AS, as well as for development a software package for analyzing and quantifying the effectiveness of these systems. The results of the simulation of functioning of the IPS from the UA in the AS can be presented in the form of various characteristics of each state, which characterize the work of the system as a whole and its subsystems. The developed simulation model can be used to create similar systems, during their operation, during certification of information security systems, during certification of informatization facilities, and during periodic monitoring of used information protection software at these facilities. The programming language Meta language used by CPN Tools allows you to monitor random transitions of the marker from the initial state to the final through the intermediate one, to set time delays, etc. The simulation model of IPS from UA to AS will be used in further studies to build the models of impact of various types of threats to this system according to the bank data threats to information security of the Federal Service for Technical and Export Control of Russia.
The analysis of access control models currently used in information security systems (SPI) is carried out. Based on the analysis of the advantages and disadvantages of discretionary, authoritative and role models in the implementation of access of mobile systems of subjects with different needs and roles to hierarchically organized information objects of medical information systems (MIS), it is proposed to use access control based on a thematic - hierarchical policy. The methods of forming thematic grids that provide security control of information flows are proposed. The article offers methods for setting the reachability matrix for reading, writing, and executing different access subjects to access objects with monorubricated and multi-rubricated hierarchical thematic classification.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.