OPTIMIZATION OF THE VOLUME OF TECHNICAL MEANS OF MACHINE LEARNING OF THE INFORMATION PROTECTION SYSTEM OF KEY SYSTEMS OF INFORMATION INFRASTRUCTURE
The purpose of this article is to consider the information activities of information security systems of information infrastructures of government agencies processing personal data in order to determine the main approaches to optimizing the volume of technical means of the information security system of information infrastructures using machine learning tools, since within the framework of the traditional approach, information protection is focused mainly on heuristic methods and the use of intuitive assessments of changes in the characteristics of information processes as a result of technical protection measures.
Based on the analysis of the organization of information protection of a given level (class) of security of the information system of a government agency, the author substantiates the integrated use of machine learning of the information security system in order to optimally use the functional volume of technical means allocated to ensure a given level (class) of security of the information security system of a government agency processing personal data.
The article proposes a number of new approaches to optimizing the volume of technical means of machine learning of an information infrastructure entity processing personal data.
The considered results made it possible to formulate the problem of modeling and optimizing the volume of technical means of machine learning of the information security system for the information activities of a government agency in the context of counteracting information leakage through technical channels.
Prokushev Ya.E., Ponomarenko S.V., Belov A.S., Maksimov R.R. Optimization of the volume of technical means of machine learning of the information protection system of key systems of information infrastructure // Research result. Information technologies. – Т.9, №4, 2024. – P. 36-43. DOI: 10.18413/2518-1092-2024-9-4-0-4
While nobody left any comments to this publication.
You can be first.
1. Federal Law No. 149-FZ of July 27, 2006 «On Information, Information Technologies and Information Protection».
2. Federal Law No. 187-FZ of July 27, 2006 «On the security of the critical information infrastructure of the Russian Federation».
3. Decree of the Government of the Russian Federation of February 08, 2018 No. 127 «On approval of the Rules for categorizing objects of critical information infrastructure of the Russian Federation and the list of indicators of criteria for the significance of objects of critical information infrastructure of the Russian Federation and their values».
4. Order No. 21 «On approval of the composition and content of organizational and technical measures to ensure the security of personal data during their processing in personal data information systems». Approved by FSTEC of Russia of 18.02.2013.
5. Order No. 239 «On approval of the Requirements for ensuring the security of significant objects of critical information infrastructure of the Russian Federation». Approved by FSTEC of Russia of 25.12.2017.
6. Ponomarenko S.V., Prokushev Ya.Е., Ponomarenko S.A. Information security of critical information infrastructure systems. Monography. Belgorod: BUKEP, 2021. – 133 p.
7. Prokushev Ya.Е., Ponomarenko S.V., Ponomarenko S.A. The modeling of information security system design processes in state information systems. Computational Nanotechnology. – 2021. – Vol. 8. – No. 1. – Pp. 26–37. (in Russian)
8. Prokushev Ya.Е., Ponomarenko S.V., Shishov N.V. The modeling of processes of design of information protection systems in critical information infrastructures. Computational Nanotechnology. – 2022. – Vol. 9. – No. 2. – Pp. 45–55. (in Russian)
9. Biryukov M.V., Klimova N.A., Gostishcheva T.V. Cost estimate on implementation of measures, ensuring information security in consumer cooperation organizations // Economics. Information technologies. – 2020. – Vol. 47. – № 1. – P. 101-109.
10. Biryukov M.V., Klimova N.A., Gostishcheva T.V. About self-learning machine systems in the process of authorization of users of ATMs // Economics. Information technologies. – 2020. – Vol. 47. – № 2. – P. 354-361.
11. Lomazov V.A., Ponomarev D.V., Ponomarenko S.V. Evolutionary synthesis of the hierarchy of estimated indicators of the project in the field of information security // Global scientific potential. – 2017. – № 11 (80). – P.82-85.
12. Ponomarenko S.V., Biryukov M.V., Klimova N.A. Economic prospects for the use of remote banking technology // Bulletin of the Belgorod University of Cooperation, Economics and Law. Belgorod: BUKEP Publishing House. – Issue 1 (68) – 2018.
13. Prokushev Ya.E., Ponomarenko S.V. Comparative analysis of software and hardware protection of information used in information systems of personal data. Information and Security. – 2012. – Vol. 15. – №. 1. – Pp. 31–36. (in Russian)
14. Prokusheva A.P., Prokushev Ya.E. Modeling and optimization of the choice of software and hardware protection of information from the point of view of economic and technical expediency. Information and Security. 2012. – Vol. 15. – No. 1. – Pp. 55–60. (in Russian)
15. Mattord H., Whitman M. Management of information security. 6th ed. Cengage Learning, 2019. – 752 p.
16. Rohit Tanwar. Information security and optimization. CRC Press, 2021. – 224 p.
17. Whitman M.E. et al. PRSCIiples of information security. 6th ed. Cengage Learning, 2017. – 656 p.