Systems and Means of Informatics
2019, Volume 29, Issue 1, pp 4-11
METHODS OF PROTECTION AGAINST MASS INACTIVATION OF LOW PROTECTED COMPUTERS OF DIGITAL ECONOMY
- A. A. Grusho
- N. A. Grusho
- E. E. Timonina
Abstract
Development of digital economy generates new threats of information security. The serious economic damage to small and medium business can put mass inactivation of low protected computers. The paper deals with certain ways to prevent such vulnerabilities. Two approaches of creation of protection against mass inactivation of low protected computers of digital economy are suggested. The first approach is connected with creation of a specialized cloud, providing services of information security. Communication of low protected computers through Internet connection is carried out only through this cloud.
The second approach is based on the idea of virtualization of computers. The special architecture of guest virtual machines is suggested. It is proved that in certain conditions, the proposed solutions prevent mass inactivation of low protected computers of digital economy.
[+] References (10)
- Grusho, A., Ed. Primenko, and E. Timonina. 2009. Teoreticheskie osnovy komp'yuternoy bezopasnosti [Theoretical bases of computer security]. Moscow: Academy. 272 ð.
- Timonina, E.E. 2004. Analiz ugroz skrytykh kanalov i metody postroeniya garan- tirovanno zashchishchennykh raspredelennykh avtomatizirovannykh sistem [The analysis of threats of covert channels and methods of creation of guaranteed protected distributed automated systems]. Moscow. D.Sc. Diss. 204 p.
- Grusho, A., N. Grusho, and E. Timonina. 2009. Metody zashchity informatsii ot atak s pomoshch'yu skrytykh kanalov i vrazhdebnykh programmno-apparatnykh agentov v raspredelennykh sistemakh [Methods of information protection against covert channels attacks and malicious software/hardware agents in distributed systems]. Vestn. RGGU. Ser. Dokumentovedenie i arkhivovedenie. Informatika. Zashchita informatsii i informatsionnaya bezopasnost' [RGGU Bull. Ser. Document science and archive science. Informatics. Information security and information security] 10:33-45.
- Grusho, A. A., E.E. Timonina, and S.Ya. Shorgin. 2017. Modelling for ensuring information security of the distributed information systems. 31th European Conference on Modelling and Simulation Proceedings. Digitaldruck Pirrot GmbHP Dudweiler, Germany. 656-660. Available at: http://www.scs-europe.net/ dlib/2017/ecms2017acceptedpapers/0656-probstat_ECMS2017_0026.pdf (accessed January 27, 2019).
- Grusho, A. A., N. A. Grusho, and E.E. Timonina. 2017. Information security architecture synthesis in distributed information computation systems. Autom. Control Comp. S. 51(8):799-804.
- Grusho, A., N. Grusho, and E. Timonina. 2016. Detection of anomalies in non- numerical data. 8th Congress (International) on Ultra Modern Telecommunications and Control Systems and Workshops Proceedings. Piscataway, NJ: IEEE. 273-276. Available at: https://ieeexplore.ieee.org/document/7765370 (accessed January 27, 2019).
- Grusho, A., N. Grusho, E. Timonina, and S. Shorgin. 2015. Vozmozhnostipostroeniya bezopasnoy arkhitektury dlya dinamicheski izmenyayushcheysya informatsionnoy siste- my [Possibilities of secure architecture creation for dynamically changing information systems]. Sistemy i Sredstva Informatiki - Systems and Means of Informatics 25(3):78-93.
- Grusho, A. A., N. A. Grusho, M. V. Levykin, and E. E. Timonina. 2016. Bezopasnye arkhitektury raspredelennykh informatsionno-vychislitel'nykh sistem na osnove kom- pleksnoy virtualizatsii [Secure architecture of distributed information systems on the basis of integrated virtualization]. Problemy informatsionnoy bezopasnosti. Komp'yuternye sistemy [Problems of Information Security. Computer Systems] 4:32-35.
- Grusho, A. A., N. A. Grusho, and E. E. Timonina. 2016. Otsenka zashchishchennosti v bezopasnykh arkhitekturakh raspredelennykh informatsionnykh sistem [Security evaluation in secure architecture of distributed information systems]. Sistemy i Sredstva Informatiki - Systems and Means of Informatics 26(4):31-37.
- Grusho, N. A., and V. V. Senchilo. 2018. Modelirovanie bezopasnykh arkhitektur raspredelennykh informatsionno-vychislitel'nykh sistem na osnove kompleksnoy virtu- alizatsii [Modeling of secure architecture of distributed information systems on the basis of integrated virtualization]. Sistemy i Sredstva Informatiki - Systems and Means of Informatics 28(1): 110-122.
[+] About this article
Title
METHODS OF PROTECTION AGAINST MASS INACTIVATION OF LOW PROTECTED COMPUTERS OF DIGITAL ECONOMY
Journal
Systems and Means of Informatics
Volume 29, Issue 1, pp 4-11
Cover Date
2019-03-30
DOI
10.14357/08696527190101
Print ISSN
0869-6527
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
information security; digital economy; cloudy computing systems; virtualization
Authors
A. A. Grusho , N. A. Grusho , and E. E. Timonina
Author Affiliations
Institute of Informatics Problems, Federal Research Center "Computer Science
and Control", Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
|