×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

Creating the automated system of the analysis of protection of information resources of educational institution of higher education

Abstract

Creating the automated system of the analysis of protection of information resources of educational institution of higher education

Okladnikova S.V., Fayzulayev D.F., Evdoshenko O.I., Morozov B.B., Zhirnova T.A.

Incoming article date: 03.07.2017

The analysis of protection of institution of higher education is labor-intensive and difficult process since it is necessary to analyze the big data (including employees). At the same time, there is a complexity in their processing, i.e. considerable expenses of time and human resources. The task of automation of this process for the solution of this problem is up to date. Each enterprise adapts the existing methods of the analysis of security on the based on a kind of activity. In this regard, an up to date task is development of new and modernization of the existing methods to a security assessment on the based on functioning of institution. The authors created an algorithm for calculation of assessment of protection of the information resources on the based on power factor of measures of protection. The offered algorithm of an assessment of the general level of security allows to define how effectively all realized methods of protection of an information system on the base various the groups of measures of ensuring information security are used. There are presented dialogical model of a system by means of the UML. The architecture and the classes of system is described. The solution at automation of process of analysis of protection proposed by authors is presented in the type of Web-service. The presentation of the created system is described on the example of the analysis of an object "1C accounts department".

Keywords: information system, information security, analysis of protection