Please use this identifier to cite or link to this item: http://repository.hneu.edu.ua/handle/123456789/24825
Title: Development of a methodology for building an information security system in the corporate research and education system in the context of university autonomy
Authors: Yevseiev S. P.
Aleksiyev V. O.
Balakireva S.
Peleshok Y.
Milov O. V.
Petrov O.
Rayevnyeva O. V.
Tomashevsky B.
Tyshyk I.
Shmatko O. V.
Keywords: corporate educational system
security threat classifier
information security system
Issue Date: 2019
Citation: Yevseiev S. Development of a methodology for building an information security system in the corporate research and education system in the context of university autonomy / S. Yevseiev, V. Aleksiyev, S. Balakireva et al. // Eastern-European Journal of Enterprise Technologies. - 2019. - 3/9 (99). - Pp. 49-63.
Abstract: The development of computational tools and technologies of corporate networks has expanded the range of educational and information services in corporate scientific and educational networks (CSEN). CSEN belong to critical cybernetic information systems (CCIS) built on the basis of open network models. This approach did not consider the need to build a security system, which does not allow it to provide the required level of protection against modern hybrid threats in the early 80s of the 20th century. The transition to autonomy in decision-making, education and university management all over the world places demands on ensuring the required quality of service (QoS) of CSEN clients. CSEN users include university administration, faculty, students and support personnel of educational services in higher education institutions. One of the main criteria for QoS is information security. However, there is no general approach to building integrated information security in CSEN, which provided the required level of security. The methodology is based on the concept of synthesizing a synergistic model of threats to CCISs, improved infrastructure models for an intruder, an intruder, assessing the current state of information security (IS) and an improved method of investing in the IS CSEN. It is shown that the basis of the synergistic model is a three-level model of strategic security management, which provides a synergistic effect in the context of simultaneous threats to information security, cybersecurity and information security. In contrast to the known, such an approach provides for the determination of qualitatively new and previously unknown emergent properties of an information security system, taking into account the means used to create it. The application of the methodology in practice through the development and implementation of new solutions to provide security services allows for the required level of information security in the CSEN. The proposed information security service mechanisms are built on hybrid cryptosystems based on crypto-code structures with unprofitable codes.
URI: http://repository.hneu.edu.ua/handle/123456789/24825
Appears in Collections:Статті (КІТ)

Files in This Item:
File Description SizeFormat 
Y e v s e i e v.pdf516,64 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.