Modeling Information Security Threats and Determination of Their Relevance for Information Systems of Informatization Objects of Federal Executive Authorities
( Pp. 106-114)

More about authors
Zavodtsev Ilia V. Cand. Sci. (Eng.), Associate Professor; associate professor
Lomonosov Moscow State University
Moscow, Russian Federation Borisov Mikhail A. associate professor
Lomonosov Moscow State University
Moscow, Russian Federation Bondarenko Nikolai N. PhD student
Lomonosov Moscow State University
Moscow, Russian Federation Meleshko Vladimir A.
Lomonosov Moscow State University
Moscow, Russian Federation
For read the full article, please, register or log in
Abstract:
Task. The purpose of writing this article is to improve the security of information in information systems. Model. The article explores methods for modeling information security threats and determining their relevance for information systems of informatization objects of federal executive authorities. Conclusions. The study is based on an assessment method that uses a cluster of outcomes, and the concept of “significance coefficient” is also introduced, as the product of the corresponding values of the priority vectors of outcome clusters. Value. The materials presented in the article will help improve methods for analyzing and evaluating the assets of an informatization object, vulnerabilities, information security threats, possible attacks and security goals.
How to Cite:
Zavodtsev I.V., Borisov M.A., Bondarenko N.N., Meleshko V.A., (2022), MODELING INFORMATION SECURITY THREATS AND DETERMINATION OF THEIR RELEVANCE FOR INFORMATION SYSTEMS OF INFORMATIZATION OBJECTS OF FEDERAL EXECUTIVE AUTHORITIES. Computational Nanotechnology, 1: 106-114. DOI: 10.33693/2313-223X-2022-9-1-106-114
Reference list:
Federal Law No. 149-FZ dated July 27, 2006 “On information, information technologies and information protection”. Collection of Legislation of the Russian Federation. 07.31.2006. No. 31 (part 1). Art. 3448. (In Rus.)
Federal Law No. 248-FZ dated July 31, 2020 “On state control (supervision) and municipal control in the Russian Federation”. Collection of Legislation of the Russian Federation. 08.03.2020. No. 31 (part 1). Art. 5007. (In Rus.)
Order of the FSTEC of Russia dated February 11, 2013 No. 17 “On approval of requirements for the protection of information that does not constitute a state secret contained in state information systems”. Rossiyskaya Gazeta. 06.26.2013. No. 136. (In Rus.)
Order of the FSTEC of Russia dated March 14, 2014 No. 31 “On approval of the Requirements for ensuring the protection of information in automated control systems for production and technological processes at critically important facilities, potentially hazardous facilities, as well as facilities that pose an increased danger to human life and health and to the natural environment”. Rossiyskaya Gazeta. 08/06/2014. No. 175. (In Rus.)
IT.SAVZ.B6.PZ. Methodical document. Protection profile of anti-virus protection type “B” of the sixth protection class (approved by the FSTEC of Russia on 14.06.2012). URL: https://fstec.ru
Methodological document. Information protection measures in state information systems (approved by the FSTEC of Russia on February 11, 2014). URL: https://fstec.ru
Methodological document. Methodology for assessing threats to information security (approved by the FSTEC of Russia on February 5, 2021). URL: https://fstec.ru
GOST R ISO/IEC 15408-1-2012. National standard of the Russian Federation. Information technology. Methods and means of ensuring security. Criteria for evaluating information technology security. Part 1: Introduction and general model. Moscow: Standartinform, 2014.
GOST R 58771-2019. National standard of the Russian Federation. Risk management. Risk assessment technologies (approved and put into effect by the Order of Rosstandart dated December 17, 2019 No. 1405-st). Moscow: Standartinform, 2020.
GOST R ISO/IEC 27001-2021. National standard of the Russian Federation. Information technology. Methods and means of ensuring security. Information security management systems. Requirements (approved and put into effect by the Order of Rosstandart dated November 30, 2021 No. 1653-st). Moscow: Standartinform, 2022.
Borisov M.A., Golod V.V., Osadchiy A.I., Trofimov V.V. Model of unauthorized access to information in dynamically changing conditions. Software Products and Systems. 2005. No. 4. Pp. 45-48. (In Rus.)
Borisov M.A., Zavodtsev I.V. Vulnerability assessment tools in automated systems. Scientific Journal Vestnik RGGU. Series Informatics. Data Protection. Maths. 2010. No. 12 (55)/10. Pp. 259-262. (In Rus.)
Doynikova E.V., Kotenko I.V. Methods and software component of risk assessment based on attack graphs for security information and event management systems. Information and Control Systems. 2016. No. 5. Pp. 56-67.
Polyansky D.A. Security assessment: Textbook allowance. Vladimir: Publishing house Vladim. State Univ., 2005. 80 p.
Shcheglov A.Yu. Mathematical models and methods of formal design of information systems protection systems: textbook. allowance. St. Petersburg: ITMO University, 2015. 93 p.
The DFIR report. Real intrusions by real attackers, the truth behind the intrusion. URL: https://thedfirreport.com
Keywords:
Information Security, qualitative and quantitative risk assessment, unauthorized access, Security policy, information security risk.