Method of risk assessment considering the security mechanism influence on parameters of the wireless information & telecommunication systems in the information operations
DOI:
https://doi.org/10.18372/2225-5036.20.6566Keywords:
wireless information & telecommunication systems, information operations, methods of risk assessment, risk level, options of wireless information & telecommunication systems, handling capacity, transmission speed, communication rangeAbstract
In this paper the method of risk assessment for the effects of protection mechanisms in the wireless information & telecommunication systems, which operate in the implementation of information operations attacks. The method takes into account the additional risk that arises in the application of mechanisms to protect information when information conflicts, which reduces the specific parameters of wireless information & telecommunication systems: its handling capacity, transmission speed, communication range, time of communication, which is an additional risk under the fighting. In applying the method reduced the article presents the results of modeling of reducing the data rate UV station in the application of noise -interference regime in different states to change the overall risk and relation with the results of previous studies.
References
ISO/IEC 27001:2013 Information technology — Security techniques — Information security management.
Information Operations / Joint Publication 3-13. — DOD, 2012. — р. 69.
Daniel Wentre. Information warfare. — San Francisco, Wiley-ISTE, 2012. — р. 320.
Толубко В.Б. Інформаційна безпека держа-ви у контексті протидії інформаційним війнам: навч. пос. // За заг. ред. В.Б. Толубка. — К. : НАОУ. — 2004. — 315 с.
Астахов А.М. Искусство управления информационными рисками. — М.: ДМК Пресс, 2010. — 312 с.
Скоробагатько Е.А. Методика количествен-ной оценки защищенности телекоммуникационных систем / Е.А. Скоробагатько // Захист інформації. — 2011. — № 3. — С. 9-13.
Скляр Б. Цифровая связь. Теоретические основы и практическое применение. [изд. 2-е испр.] / Б. Скляр: пер. с англ. — М.: Издательский дом «Вильямс». — 2003. — 1104 c.
УКВ радиостанция Р-005У [Электр. ресурс] // официальный сайт ООО «Телекарт-Прибор» — Режим доступу: http://telecard.odessa.ua/ production/dlya_silovyh_struktur/sredstva_svyazi/6
Шевченко А.С. Модель процесу приду-шення радіоліній безпроводових інформаційно-телекомунікаційних систем під час інформаційної боротьби / А.С. Шевченко, О.Є. Мазулевський // Сучасний захист інформації. — 2012. — № 4. — С. 35-40.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.