Building protection systems on the basis of information multilevel hierarchical model

Authors

  • Serhii Toliupa Faculty of information technology of Taras Shevchenko National university of Kyiv, Kyiv,, Ukraine
  • Oleksandr Uspenskyi Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv,, Ukraine

DOI:

https://doi.org/10.20535/2411-1031.2016.4.2.109917

Keywords:

Protection reporting purposes, information technology, security model, the integrity of system protection.

Abstract

At the modern stage of the development in the field of information technology it is still impossible to provide the software information security over the whole information system for lack of practical decisions in the market, which should work for organizing integrated information security systems in particular. So nowadays, in our opinion, the ultimate solution is to organize exactly these complex information security systems, developed on basis of hierarchical multilevel model. Obviously, it is generally possible to organize the integrated information security system, but only with limitless resources of the project. Therefore, a reasonable and, what is the most important, sufficient compromise between functional group of the system and aggregate value of its construction and exploitation is required to be found in practice. According to the suggested model, the security problem may be solved through delimitation of requirements and functionality for each of information security system levels naturally with reference to every group of the information resources and security tools. It is possible to put it into practice, because within the limits of one level requirements to information security are determined. One of the main advantages of presenting information security system as a hierarchy of functionally independent levels is significant simplification of system design, because the designing of one multifunctional and complex system may be divided into several finished stages of designing far less complicated systems for every level taken separately and for the finishing operation in order to control the security system integrity by stepping from one level to another. The suggested system approach enables to reduce time for information security system development and to offer a customer a really ultimate and reasonable decision at the same time.

Author Biographies

Serhii Toliupa, Faculty of information technology of Taras Shevchenko National university of Kyiv, Kyiv,

doctor of technical sciences, professor,
professor at the cybersecurity
and information protection
academic department

Oleksandr Uspenskyi, Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv,

candidate of technical sciences,
associate professor, associate
professor at the cybersecurity
and application of information
systems and technologies
academic department

References

V.I. Andreev, Yu.Yu. Goncharenko, M.M. Divizinyuk, I.N. Pavlov, and V.A. Horoshko. Technical security information system design. Sevastopol, Ukraine: “SNUIAEiP” Publ, pp. 147-151, 2011.

S.V. Tolyupa, and І.І. Parhomenko, “Organisation of integrated security information systems based on the structural approach”, Modern ways of information securing, no. 4, pp. 96-104, 2015.

I.N. Pavlov, “Security information system design. Formal approach”, Legal, standard and metrological secure software in Ukraine, no. 11, pp. 54-59, 2005.

S.V. Tolyupa, “Projecting of decision-making support systems in process of restoring and integrated securing of information systems”, Modern ways of information securing, no. 4, pp. 69-74, 2015.

S.V. Tolyupa, V.S. Nakonechnyy, Yu.M. Yakimenko, “Information security evaluation in computer-controlled systems due to the general criteria”, Scientific investigations of the Signals Research Study institute in Ukraine, no. 6 (40), pp. 27-31, 2015.

S.V. Tolyupa, V.S. Nakonechnyy, Yu.M. Yakimenko, “Information securing in computer-controlled information systems”, Scientific investigations of the Signals Research Study institute in Ukraine, no. 5 (39), pp. 33-37, 2015.

Published

2016-12-31

How to Cite

Toliupa, S., & Uspenskyi, O. (2016). Building protection systems on the basis of information multilevel hierarchical model. Collection "Information Technology and Security", 4(2), 172–181. https://doi.org/10.20535/2411-1031.2016.4.2.109917

Issue

Section

INFORMATION SECURITY