On Modeling the Assessment of the Security of Information Resources in a Telecommunications Network of Centrally Protected Objects
this article proposes a methodology for assessing the security of information resources in a telecommunications network of centrally protected objects (TS CSO). The main purpose of TS CSO is to issue an alarm notification when a threat of unauthorized access (UA) to a protected object is detected us...
Saved in:
Published in: | 2023 Dynamics of Systems, Mechanisms and Machines (Dynamics) pp. 1 - 5 |
---|---|
Main Authors: | , , , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
14-11-2023
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | this article proposes a methodology for assessing the security of information resources in a telecommunications network of centrally protected objects (TS CSO). The main purpose of TS CSO is to issue an alarm notification when a threat of unauthorized access (UA) to a protected object is detected using on-site security alarm systems (SAS). Protected information is the timeliness, accuracy and reliability of data on the time and place of UA at protected sites. Protected information (activation of SAS means) is generated from security detectors, and passing through all elements of the TS CSO, must be transferred to the duty officer of the centralized security point (CSP) along with the physical security, who responds to the intruder's UA. The paper proposes a methodology for assessing the security of information resources in a TS CSO using the following metrics: average security of a TS CSO against the implementation of all types of threats for a given type of intruder; the average achievable security of the TS CSO against the implementation of all types of threats, with all the maximum possible DMs being implemented for a given type of intruder. |
---|---|
ISSN: | 2644-2760 |
DOI: | 10.1109/Dynamics60586.2023.10349657 |