Analysis of existing approaches to the formation of functional security profiles

Authors

  • Ostapets D.
  • Sukhomlyn O.

DOI:

https://doi.org/10.34185/1562-9945-6-155-2024-20

Keywords:

functional security profile, information security, automated system, intelligent methods, expert system.

Abstract

The work examines existing methods for forming functional security profiles (FSP) for information protection systems. The purpose of the work is to analyze approaches to deter-mining FSP when designing information protection systems based on their comparative char-acteristics. Solved tasks: formation of requirements for the characteristics of approaches and methods for determining the FSP, analysis of existing approaches and methods for determin-ing the FSP and their comparative characteristics. The authors explore the key characteris-tics of various methodologies, such as time consumption, complexity, the influence of expert qualification, and the possibility of creating non-standard profiles. The work compares the advantages and limitations of existing methods. The research shows that all methodologies require significant time and are dependent on the qualifications of specialists. At the same time, most methods support the development of non-standard profiles, allowing them to be adapted to specific information security requirements. Based on the analysis, it is concluded that the use of automated systems based on intelligent methods is necessary to improve the efficiency and accuracy of FSP formation. Thus, the work makes a significant contribution to the field of information security research, providing practical recommendations for improv-ing methodologies for forming FSP in the context of increasing threats in the information technology sphere.

References

Criteria for Assessing Information Security in Computer Systems from Unauthorized Ac-cess: ND TZI 2.5-004-99. – Available at: http://www.dstszi.gov.ua/dstszi/doccatalog/document?id=41649

Classification of Automated Systems and Standard Functional Security Profiles of Proc-essed Information from Unauthorized Access: ND TZI 2.5-005-99. – Available at: http://www.dstszi.gov.ua/dstszi/doccatalog/

Methodical Guidelines for Assessing the Level of Correctness Guarantees in Implement-ing Functional Security Services in Information Protection Tools from Unauthorized Access: ND TZI 2.7-010-09. – Available at:

http://www.dsszzi.gov.ua/dsszzi/doccatalog/document?id=103247

Palamarchuk N.A., Khlaponin Yu.I., Ovsyannikov V.V. The Current State of the Regula-tory Framework in the Field of Technical Information Protection // Collection of Scientific Papers of VITI NTUU "KPI" – K.: VITI NTUU "KPI", 2011. No. 3. P. 78-82. Available at: http://viti.edu.ua/files/zbk/2011/11_3_2011.pdf

Lenshin A.V., Buslov P.V. Method of Forming Functional Security Profiles from Unau-thorized Access // Radio-electronic and Computer Systems: Scientific Journal – Kharkiv: Na-tional Aerospace University “KhAI”, 2010. – Issue 7(48). – P. 77–81. – Available at: http://nbuv.gov.ua/UJRN/recs_2010_7_15

Potii O.V., Lenshin A.V. Methods of Building and Verifying the Consistency and Com-pleteness of Functional Security Profiles from Unauthorized Access // Scientific and Techni-cal Journal "Applied Radio Electronics. Thematic Issue Devoted to Information Security Problems”. – Kharkiv, 2010. – Vol. 9. – No. 3. – P. 479–488. – Available at:

openarchive.nure.ua/handle/document/410.

Piskun S.G., Khoroshko V.O. Optimization of Functional Security Profile Selection // Modern Special Equipment. - 2011. - No. 3. - P. 36-40. - Available at:

http://nbuv.gov.ua/UJRN/sstt_2011_3_8

Tkach U. M. Method of Selecting a Functional Security Profile // Informatics and Mathe-matical Methods in Modeling. – 2020. – Vol. 10, No. 1-2. – P. 68-74.

Yudin O.K., Buchyk S.S., Melnyk S.V. Theoretical Foundations for Defining Standard Functional Security Profiles of Automated Systems from Unauthorized Access. High-Tech Technologies. 2016. Issue 2. P. 195-205.

Berestov D.S. Methodology for Selecting Design Alternatives for Information Protection Systems in Departmental Automated Systems Based on Hierarchical Models: PhD Thesis Ab-stract in Technical Sciences: 05.13.21. Kyiv, 2015. - 21 p.

Potenko O.S. Methods for Defining the Functional Security Profile of an Automated Sys-tem Considering the Current Threat Level: PhD Thesis Abstract in Technical Sciences: 05.13.21. Kyiv, 2024. - 24 p.

Downloads

Published

2025-02-02