<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2023-8-4-0-1</article-id><article-id pub-id-type="publisher-id">3297</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;ANALYSIS OF SOFTWARE AND HARDWARE-SOFTWARE TOOLS FOR INFORMATION PROTECTION IN INFORMATION SYSTEMS OF PUBLIC AUTHORITIES&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;ANALYSIS OF SOFTWARE AND HARDWARE-SOFTWARE TOOLS FOR INFORMATION PROTECTION IN INFORMATION SYSTEMS OF PUBLIC AUTHORITIES&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kalchenko</surname><given-names>Daniil Mikhailovich</given-names></name><name xml:lang="en"><surname>Kalchenko</surname><given-names>Daniil Mikhailovich</given-names></name></name-alternatives></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Zalivin</surname><given-names>Aleksandr Nikolaevich</given-names></name><name xml:lang="en"><surname>Zalivin</surname><given-names>Aleksandr Nikolaevich</given-names></name></name-alternatives><email>zalivin@bsu.edu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Fedorov</surname><given-names>Alexey Vasilyevich</given-names></name><name xml:lang="en"><surname>Fedorov</surname><given-names>Alexey Vasilyevich</given-names></name></name-alternatives></contrib></contrib-group><pub-date pub-type="epub"><year>2023</year></pub-date><volume>8</volume><issue>4</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2023/4/ИТ_НР_8.4_1.pdf" /><abstract xml:lang="ru"><p>The article discusses various means of protection that can ensure the security of information systems (IS) of government agencies. When considering security measures to ensure the security of information systems, it is important to consider the possibility of successful implementation of distorted information. This makes it possible to identify the most significant threats and risks for the authorities in order to develop the most effective protection measures. Among the security tools under consideration will be access control systems, firewalls, antiviruses, intrusion detection systems and data encryption. Each of these tools has its own features and functionality that need to be studied and analyzed. By analyzing these security measures, we will be able to determine which of them may be most effective for ensuring the security of information systems in various scenarios. This approach will allow government agencies to develop and implement comprehensive and tailored security strategies, minimizing vulnerabilities and risks. The basic principles of the choice and implementation of security tools are also considered and the main domestic information security management systems are proposed, as well as the necessary organizational measures after the introduction of these tools. Thus, our analysis of IP security protections offers a study of various tools and helps government agencies make informed security decisions</p></abstract><trans-abstract xml:lang="en"><p>The article discusses various means of protection that can ensure the security of information systems (IS) of government agencies. When considering security measures to ensure the security of information systems, it is important to consider the possibility of successful implementation of distorted information. This makes it possible to identify the most significant threats and risks for the authorities in order to develop the most effective protection measures. Among the security tools under consideration will be access control systems, firewalls, antiviruses, intrusion detection systems and data encryption. Each of these tools has its own features and functionality that need to be studied and analyzed. By analyzing these security measures, we will be able to determine which of them may be most effective for ensuring the security of information systems in various scenarios. This approach will allow government agencies to develop and implement comprehensive and tailored security strategies, minimizing vulnerabilities and risks. The basic principles of the choice and implementation of security tools are also considered and the main domestic information security management systems are proposed, as well as the necessary organizational measures after the introduction of these tools. Thus, our analysis of IP security protections offers a study of various tools and helps government agencies make informed security decisions</p></trans-abstract><kwd-group xml:lang="ru"><kwd>information security problems</kwd><kwd>analysis and selection of software and hardware</kwd><kwd>hardware protection</kwd><kwd>software protection tools</kwd><kwd>replacement of imported software</kwd></kwd-group><kwd-group xml:lang="en"><kwd>information security problems</kwd><kwd>analysis and selection of software and hardware</kwd><kwd>hardware protection</kwd><kwd>software protection tools</kwd><kwd>replacement of imported software</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>GOST R 50922-96 Information protection. Basic terms and definitions.</mixed-citation></ref><ref id="B2"><mixed-citation>About information, information technologies and information protection [Electronic resource]: feder. Law No. 149-FZ of 27.07.2007 (as amended on 02.12.2019) // Consultant: inform. &amp;ndash; legal company website &amp;ndash; Moscow, 2019. &amp;ndash; Access mode: http://www.consultant.ru/document /cons_doc_LAW_61798// (accessed: 10/30/2023)</mixed-citation></ref><ref id="B3"><mixed-citation>About personal data [Electronic resource] feder. law of 27.07.2006 N 152-FZ (as amended on 31.12.2017)&amp;nbsp;// Consultant: inform. &amp;ndash; legal company website &amp;ndash; Moscow, 2019. &amp;ndash; Access mode: http://www.consultant.ru/document/cons_doc_LAW_61801 // (accessed: 10/30/2023).</mixed-citation></ref><ref id="B4"><mixed-citation>Streltsov, A.A. The content of the concept of &amp;quot;ensuring information security&amp;quot;. &amp;ndash; Text: direct // Information Society, 2015. &amp;ndash; No.4. &amp;ndash; p.12.</mixed-citation></ref><ref id="B5"><mixed-citation>Babash, A.V. Cryptographic methods of information protection: a textbook / A.V. Babash, E.K.&amp;nbsp;Baranova. &amp;mdash; Moscow: Knorus, 2018. &amp;mdash; 190 p. &amp;ndash; Text: direct.</mixed-citation></ref><ref id="B6"><mixed-citation>Kozlov, S.N. Information protection: unauthorized removal devices and the fight against them: a textbook&amp;nbsp;/ S.N. Kozlov. &amp;ndash; M.: Academic project, 2018. &amp;ndash; 286 p. &amp;ndash; Text: direct.</mixed-citation></ref><ref id="B7"><mixed-citation>Krakovsky, Yu.M. Information protection: a textbook / Yu.M. Krakovsky. &amp;ndash; Moscow: Phoenix, 2017. &amp;ndash; 348 p. &amp;ndash; Text: direct.</mixed-citation></ref><ref id="B8"><mixed-citation>Nikiforov, S.N. Methods of information protection: secure networks: a textbook / S.N. Nikiforov. &amp;ndash; Moscow: Lan, 2018. &amp;ndash; 96 p. &amp;ndash; Text: direct.</mixed-citation></ref><ref id="B9"><mixed-citation>Nikiforov, S.N. Methods of information protection: passwords, hidden, encryption: textbook. for universities / S.N. Nikiforov. &amp;ndash; Moscow: Lan, 2018. &amp;ndash; 124 p. &amp;ndash; Text: direct.</mixed-citation></ref><ref id="B10"><mixed-citation>Petrakov, A.V. Fundamentals of practical information protection: a textbook / A.V. Petrakov. &amp;ndash; Moscow: Solon Press, 2005. &amp;ndash; 384 p. &amp;ndash; Text: direct.</mixed-citation></ref><ref id="B11"><mixed-citation>Severin, V. A. Complex information protection at the enterprise: textbook for universities / V.A.&amp;nbsp;Severin.&amp;nbsp;&amp;ndash; Moscow: Gorodets, 2008. &amp;ndash; 368 p. &amp;ndash; Text: direct.</mixed-citation></ref><ref id="B12"><mixed-citation>Khorev, P.B. Hardware and software protection of information: textbook. the manual / P.B. Khorev. &amp;ndash; Moscow: Forum, 2019. &amp;ndash; 352 p. &amp;ndash; Text: direct.</mixed-citation></ref><ref id="B13"><mixed-citation>Tsaregorodtsev, A.V. Methods and means of information protection in public administration: a textbook&amp;nbsp;/ A.V. Tsaregorodtsev, M.M. Taraskin. &amp;ndash; Moscow: Prospekt, 2017. &amp;ndash; 208 p. &amp;ndash; Text: direct.</mixed-citation></ref><ref id="B14"><mixed-citation>Chefranova, A.O. Information security system: a course of lectures / A.O. Chefranova. &amp;ndash; Moscow: DMK-press, 2015. &amp;ndash; 392 p. &amp;ndash; Text: direct.</mixed-citation></ref><ref id="B15"><mixed-citation>Shangin, V.F. Information security and information protection: textbook for universities / V.F. Shangin.&amp;nbsp;&amp;ndash; Moscow: DMK-press, 2017. &amp;ndash; 702 p. &amp;ndash; Text: direct.</mixed-citation></ref><ref id="B16"><mixed-citation>Shangin, V.F. Information protection in computer systems and networks: textbook for universities / V.F.&amp;nbsp;Shangin. &amp;ndash; Moscow: DMK-press, 2012. &amp;ndash; 592 p. &amp;ndash; Text: direct.</mixed-citation></ref><ref id="B17"><mixed-citation>The AstraLinux security model is the basis for testing new GOST standards &amp;ndash; 05/14/2021: article &amp;minus; URL: https://astralinux.ru/about/press-center/news/model-bezopasnosti-astra-linux-osnova-dlya-aprobatsii-novykh-gostov/ &amp;ndash; Text: electronic.</mixed-citation></ref><ref id="B18"><mixed-citation>S. Shilyaev. Information security problems: an algorithm for building an information security system from scratch &amp;ndash; 02/24/2015: article &amp;minus; URL: https://kontur.ru/articles/1622 &amp;ndash; Text: electronic.</mixed-citation></ref><ref id="B19"><mixed-citation>The registry of Russian software. The Ministry of Digital Development, Communications and Mass Media of the Russian Federation. &amp;minus; URL: https://reestr.digital.gov.ru/</mixed-citation></ref><ref id="B20"><mixed-citation>Decree of the President of the Russian Federation No. 250 dated 05/01/2022 On Additional Measures to Ensure Information Security of the Russian Federation. &amp;minus; URL: http://www.kremlin.ru/acts/bank/47796 &amp;ndash; Text: electronic.</mixed-citation></ref></ref-list></back></article>