|
||||||||||
|
DOI: 10.17587/it.24.791-798 R. R. Fatkieva, Senior Researcher, e-mail: rikki2@yandex.ru, R. R. Ryzhkov, Engineer, e-mail: Ryzhkov@iias.spb.su, St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, 199178, St. Petersburg, Russian Federation Assessment of Violations of Information Security Perimeter in the Cloud The processes influencing the safety of the virtual environment of the client, from the moment of establishing the connection till obtaining the results, were investigated. It is proposed to use the Markov model to identify the most significant threats and to predict the state of the system. It is shown that due to the information security, not only the probability of successful regular workload is increased, but also the probability of collecting additional data by an intruder due to increased interest in the system. The analysis of the results of modeling the processes of security of the virtual environment of the client and the application of an integrated approach to ensuring information security, showed the following. Modern stereotypes to protect the processes of virtual environment are not fully ready to withstand current threats and new security challenges. In this regard, there is a strong need to improve the scientific and methodological apparatus. Using the example of a specific task with typical processes, the Markov model was used to identify the most significant threats, expedient measures for protecting and predicting the state of the system. A similar methodology can be used for other security models, for finding appropriate protection measures and predicting the state of the system. Application of the results obtained in the process of building, operating and upgrading the information security for cloud services leads to increased efficiency and quality of service and allows to effectively manage the information security. P. 791–798
|