Typing of data transfer processes in the information system within the framework of threat modeling

01/30/2023
by   E. S. Romanova, et al.
0

Work is aimed at automating the process of obtaining a list of security threats aimed at the information system in the work processes of data transfer are considered, definitions for each process are presented. The typification of processes and the formalization of the list of basic data transfer processes are considered. Based on the presented typical data transmission processes, schemes of these processes have been developed that describe transmission channels and information carriers.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/08/2018

Implementing a Method for Stochastization of One-Step Processes in a Computer Algebra System

When modeling such phenomena as population dynamics, controllable ows, e...
research
12/04/2020

Threats to the information system in the physical environment and cyberspace

The purpose of the study is to supplement and update the list of threats...
research
12/29/2017

Threat Modeling Data Analysis in Socio-technical Systems

Our decision-making processes are becoming more data driven, based on da...
research
09/30/2019

Authentication Modeling with Five Generic Processes

Conceptual modeling is an essential tool in many fields of study, includ...
research
09/26/2022

Characteristics and Main Threats about Multi-Factor Authentication: A Survey

This work reports that the Systematic Literature Review process is respo...
research
08/21/2015

A Case Study on Covert Channel Establishment via Software Caches in High-Assurance Computing Systems

Covert channels can be utilized to secretly deliver information from hig...
research
02/02/2016

Development of an Ideal Observer that Incorporates Nuisance Parameters and Processes List-Mode Data

Observer models were developed to process data in list-mode format in or...

Please sign up or login with your details

Forgot password? Click here to reset