Scientific and Technical Journal

ELECTROTECHNIC AND COMPUTER SYSTEMS

ISSN Print 2221-3937
ISSN Online 2221-3805
CYBER SECURITY OF COMPUTER SYSTEMS OF TRANSPORT
Abstract:
The results of researches, allowing raising the level of protection of the information systems of transport enterprises are presented in the article. Using the new mathematical models of flexible reliability, availability, confidentiality and integrity of information processed, allowing mathematically describe the mechanisms of cyber security.
Authors:
Keywords
DOI
References

1. Kornienko A.A., Yeremeev M.A., Adadurov S.Ye. Sredstva zashchity informatsii na zheleznodorozhnom transporte. [The means of protection information in rail transport], (2006), Moscow, Marshrut Publ., pp. 256 (In Russian).

2. Lahno V. A., Petov A.S. Modeling information security system of transport enterprises. Management and production engineering: monography / Edited by M. Dudek, H. Howaniec. Poland, Bielsko-Biala, Academia Techniczno – Humanistyczna w Bielsko-Biala, (2012), pp. 221-248 (In English).

3. Vacca J.R., (2010), Managing Information Security, USA, Elsevier-Syngress, pp. 320 ISBN: 978-1-59749-533-2 (In English).

4. Website of “Mitre” [Electronic Resource] (In English), available at:http://www.mitre.org /research /overview(accessed 01.02.2016).

5. Website of “Trustwave” [Electronic Resource] (In English), available at: https://www.trustwave.com/Resources/ Security-Stats/ (accessed 30.01.2016).

6. Lahno V. Ensuring of information processes’ reliability and security in critical application data processing systems (2014), MEST Journal, Belgrade, Serbia, Vol. 2, No 1, pp. 71-79. (In English).

7. Website of “scadahacker” [Electronic Resource] (In English), available at: https://www.scadahacker.com/(accessed 01.12.2015).

8. SANS Institute InfoSec Reading Room, Denial of Service attacks and mitigation techniques: Real time implementation with detailed analysis, [Electronic Resource] (In English), available at: https://www.sans.org/reading-room/whitepapers/detection/denial-service-attacks-mitigation-techniques-real-time-implementation-detailed-analysi-33764(accessed 01.06.2014).

9. Khakerskie sorevnovaniya na Positive Hack Days, [Hacking contest in the Positive Hack Days] [Electronic Resource] (In Russian), available at: https://habrahabr.ru/company/pt/ blog/ 178439 / (accessed 30.04.2013).

10. Lahno V. Information security of critical application data processing systems, (2014), ТЕKA. Commission of motorization and energetics in agriculture, Krakow, Poland, Vol. 14, No.1, рр. 134-143 (In English).

Published:
Last download:
2017-11-16 11:41:51

[ © KarelWintersky ] [ All articles ] [ All authors ]
[ © Odessa National Polytechnic University, 2014. Any use of information from the site is possible only under the condition that the source link! ]
Яндекс.Метрика