In the article, we consider an approach to justification of communication network modernization on introduction of new communication services. Optimality criterion of network completions is economic efficiency. Problems of introduction of new communication services are analyzed. The structurally functional model of communication network modernization and a model of decision-making at the choice of optimum by the set criterion of completions of each communication network system are given. Results of modeling are illustrated by a settlement example.
Is proposed the universal skeleton functional simulator of administrative processes by technical systems (TS), with the detailed treatment of functions forming decision making process. Simulator is presented in the form of IDEF0-graphs. With the use of this simulator is determined the functional composition of simulators TS utilized in the process of the acceptance of managerial decisions. Are determined the principles of the classification of unstaff situations and detected the reasons of their appearance. Are determined abilities and the perspectives of the applicable use of such simulator.
Are stated shareable systematic requirements produced to the simulators of operation to and the principles of driving by the conditions of technical systems (TS). Are detected the typed features of source descriptors TS impeding the construction of their simulators. Is proposed the structural- functional simulator of the processes of the control behavior of TS in the form of the IDEF0 chart allowing pictorial to present and analyze the regularities of their cause-effect relations from general system attitudes. The detail of the attributes of this simulator lets to ground and to develop the shareable systematic methods of the formalization of the verbal descriptors of the principles of driving and operation TS.
Traditional approaches to assessing the effectiveness of information security, based on a comparison of the possibilities of realizing threats to information security in absence and application of protection measures, do not allow to analyze the dynamics of suppression by security measures of the process of implementing threats. The paper proposes a new indicator of the effectiveness of protection of electronic documents, aimed at assessing the possibility of advancing security measures of the process of implementing threats in electronic document management systems using the probability-time characteristics of the dynamics of the application of protection measures and the implementation of threats to electronic documents. Mathematical models were developed using the Petri-Markov network apparatus and analytical relationships were obtained for calculating the proposed indicator using the example of the "traffic tunneling" threat (placing intruder packets in trusted user packets) and unauthorized access (network attacks) to electronic documents, as well as the threat of intrusion of malicious program by carrying out an "blind IP spoofing" attack (network address spoofing). Examples of calculating the proposed indicator and graphs of its dependence on the probability of detecting network attacks by the intrusion detection system and on the probability of malware detection by the anti-virus protection system are given. Quantitative dependencies are obtained for the effectiveness of protection of electronic documents due to being ahead of protection measures for threat realization processes, both on the probability of detecting an intrusion or the probability of detecting a malicious program, and on the ratio of the time spent by the protection system on detecting an attempt to implement a threat and taking measures to curb its implementation, and threat implementation time. Models allow not only to evaluate the effectiveness of measures to protect electronic documents from threats of destruction, copying, unauthorized changes, etc., but also to quantify the requirements for the response time of adaptive security systems to detectable actions aimed at violating the security of electronic documents, depending on the probability -temporal characteristics of threat realization processes, to identify weaknesses in protection systems related to the dynamics of threat realization and the reaction of defense systems to such threats electronic document.
1 - 4 of 4 items