دانلود رایگان مقاله انگلیسی یکپارچگی سیستم و امنیت سیستم های اطلاعاتی - الزویر 2017

عنوان فارسی
یکپارچگی سیستم و امنیت سیستم های اطلاعاتی
عنوان انگلیسی
System Integration and Security of Information Systems
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
8
سال انتشار
2017
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
E6852
رشته های مرتبط با این مقاله
مهندسی کامپیوتر، مهندسی فناوری اطلاعات
گرایش های مرتبط با این مقاله
امنیت اطلاعات، رایانش امن، مدیریت سیستمهای اطلاعات
مجله
پروسه علوم کامپیوتر - Procedia Computer Science
دانشگاه
Sumy State University - Rymskogo-Korsakova st. - Sumy -Ukraine
کلمات کلیدی
سیستم اطلاعات؛ سیستم تشخیص نفوذ؛ روش رفتاری؛ روش امضاء؛ امنیت سیستم های اطلاعاتی
۰.۰ (بدون امتیاز)
امتیاز دهید
چکیده

Abstract


The frequency of unauthorized actions to information systems (IS) in the process of their integration is steadily increasing, which inevitably leads to huge financial and material losses. According to statistics, internal users of IS, commit more than half of all violations. All of this forms "a dangerous group of risk ". Existing approaches for IS security are mainly provided by specialized tools of differentiation of user access to information resources. At the same time each user is assigned certain rights, in accordance with which it is permitted/prohibited local access to information is stored in PC, or remote access via communication links to information available on other PC. After analyzing we identified 2 major vulnerabilities: tools of differentiation of local access are not able to provide protection against the actions of offenders are not directly related to obtaining unauthorized access to IS resources and tools of differentiation of remote access does not provide protection from network by internal users of the system. The results of this research will lead to an improvement of the process of ensuring effective protection against threats to information security in the IS.

نتیجه گیری

6. Conclusion


The current strategy of information systems protection is should be partially reviewed. According to the fact that for a long time, this problem was solved only with the tolls of access control, so completely protect the IS from insiders it was not possible. It connects to the fact that the functionality of these tools do not allow to protect the IS from the internal network attacks, as well as the actions of internal users of IS, which is not directly related to the violation of the access rules restricting to the information resources of IS.


To protect information security from internal threats it is need to use ISD and active monitoring system. The sensors of ISD are installed at servers of the intrusion detection system and IS workstation and perform the functions of detection the network attacks by analyzing network traffic. The sensors of active monitoring system are installed on users workstations of IS and allow to detect and block the actions of users who violate the specified policy. The sharing use of intrusion detection systems and active monitoring systems allow to use a comprehensive approach in the protection against internal attacks and significantly improve the level of information security in IS.


بدون دیدگاه