Traditional approaches to assessing the effectiveness of information security, based on a comparison of the possibilities of realizing threats to information security in absence and application of protection measures, do not allow to analyze the dynamics of suppression by security measures of the process of implementing threats. The paper proposes a new indicator of the effectiveness of protection of electronic documents, aimed at assessing the possibility of advancing security measures of the process of implementing threats in electronic document management systems using the probability-time characteristics of the dynamics of the application of protection measures and the implementation of threats to electronic documents. Mathematical models were developed using the Petri-Markov network apparatus and analytical relationships were obtained for calculating the proposed indicator using the example of the "traffic tunneling" threat (placing intruder packets in trusted user packets) and unauthorized access (network attacks) to electronic documents, as well as the threat of intrusion of malicious program by carrying out an "blind IP spoofing" attack (network address spoofing). Examples of calculating the proposed indicator and graphs of its dependence on the probability of detecting network attacks by the intrusion detection system and on the probability of malware detection by the anti-virus protection system are given. Quantitative dependencies are obtained for the effectiveness of protection of electronic documents due to being ahead of protection measures for threat realization processes, both on the probability of detecting an intrusion or the probability of detecting a malicious program, and on the ratio of the time spent by the protection system on detecting an attempt to implement a threat and taking measures to curb its implementation, and threat implementation time. Models allow not only to evaluate the effectiveness of measures to protect electronic documents from threats of destruction, copying, unauthorized changes, etc., but also to quantify the requirements for the response time of adaptive security systems to detectable actions aimed at violating the security of electronic documents, depending on the probability -temporal characteristics of threat realization processes, to identify weaknesses in protection systems related to the dynamics of threat realization and the reaction of defense systems to such threats electronic document.
This article is devoted to evaluation of the effectiveness of the spacecraft remote sensing of the Earth. The probability of monitoring the spacecraft remote sensing of the specified area is proposed as a generalized indicator of the effectiveness. That probability depends on the probability of the reception of information about the object and the probability of occurrence of data transmission to the point of processing through the channels of satellite communication systems. The probability of obtaining information about an object is determined by the probability of object detection in the area and probability of its identification. The focus is on the estimation of the probability of object detection in a service area. This figure has a geometric meaning, which determines the percentage of the area surface viewed by the spacecraft. The calculation of geometric probability is generally performed using R-functions. The work includes mathematical description of the span and area of service by the final mathematical expressions, on the basis of which correlations to calculate area-based indicators of the viewing areas of the earth's surface were obtained.
1 - 2 of 2 items