Cybersecurity: Education, Science, Technique

Journal Information
EISSN : 26634023
Current Publisher: Borys Grinchenko Kyiv University (10.28925)
Total articles ≅ 71
Current Coverage
DOAJ
Filter:

Latest articles in this journal

Cybersecurity: Education, Science, Technique; doi:10.28925/2663-4023

Volodymyr Buriachok, Volodymyr Sokolov, Taj Dini Mahyar, Mahyar Taj Dini
Cybersecurity: Education, Science, Technique, Volume 3, pp 6-16; doi:10.28925/2663-4023.2020.7.616

Yаroslav Sovyn, Volodymyr Khoma
Cybersecurity: Education, Science, Technique, Volume 3, pp 131-152; doi:10.28925/2663-4023.2020.7.131152

Mariya Nazarkevych, Yaroslav Voznyi, Sergiy Dmytryk
Cybersecurity: Education, Science, Technique, Volume 3, pp 115-130; doi:10.28925/2663-4023.2020.7.115130

Mikola Zaharchenko, Matin Hadzhyiev, Nariman Salmanov, Denis Golev, Natalya Shvets
Cybersecurity: Education, Science, Technique, Volume 3, pp 95-102; doi:10.28925/2663-4023.2020.7.95102

Svitlаnа Rzаiеvа, Dmуtrо Rzаiеv, Valeriy Kraskevich, Andrii Roskladka, Volodymir Gamaliy
Cybersecurity: Education, Science, Technique, Volume 3, pp 72-84; doi:10.28925/2663-4023.2020.7.7284

Volodymyr Barannik, Yuriy Ryabukha, Pavlo Hurzhii, Vitalii Tverdokhlib, Oleh Kulitsa
Cybersecurity: Education, Science, Technique, Volume 3, pp 63-71; doi:10.28925/2663-4023.2020.7.6371

Tamara Radivilova, Lyudmyla Kirichenko, Maksym Tawalbeh, Petro Zinchenko, Vitalii Bulakh
Cybersecurity: Education, Science, Technique, Volume 3, pp 17-30; doi:10.28925/2663-4023.2020.7.1730

Liudmyla Tereikovska
Cybersecurity: Education, Science, Technique, Volume 3, pp 31-42; doi:10.28925/2663-4023.2020.7.3142

Serhii Zybin
Cybersecurity: Education, Science, Technique, Volume 3, pp 103-114; doi:10.28925/2663-4023.2020.7.103114

Abstract:
The article is devoted to the optimization of the structures and traffic development for information transmission in secured corporate networks by quantitative factor. Optimization is carried out in the local task of calculating rational amounts of information. To this end, a mathematical formulation of a local problem is formulated. Which is to optimize the resources of the information system by quantitative criteria. The task is solved by calculating rational amounts of information and entering them in the description of information system resources. It is necessary to evaluate the quality of networks that are being designed based on multicriteria optimization. This is due to the increase in volume and the variety of tasks being promoted to secured corporate networks. This optimization should take into account the full range of recent developments in the field of systematic approach, modern scalarisation principles, decomposition and aggregation techniques, graph theory, optimization algorithms, hierarchical synthesis structuring methods with consistent decision making. The task begins with the construction of information structures, which are linked oriented graphs. The vertices of the graphs are macro-level interaction tasks that carry out information exchange between local area network elements and local area networks, while arcs are information influences or messages. The structures for the micro level are accordingly constructed. Macro-level and micro-level interaction tasks are divided into three types: source resources; transit resources; user resources. The optimization of structures by quantitative factor is carried out in the local task of calculating rational amounts of information. The amount of information means the number of elementary characters. It should be noted that these are volumes of information that consist of basic rather than synthetic indicators. A reasonable amount of information must comply with the completeness of the information which are put forward by consumers task. If the amount of information is less than required, then the network element, the consumer, or the entire network will experience a lack of information. If the required volume is exceeded, there is an unproductive cost of generating, processing and transmitting information or the results of the tasks, as well as threats to the availability of the system. In the global case, the problem is much more complicated because part of the information flow can be an information destructive influence or a threat of breach of information security criteria. Стаття присвячена оптимізації розробки структур і трафіків передачі інформації в захищених корпоративних мережах за кількісним фактором, яка здійснюється в локальній задачі обчислення раціональних об’ємів інформації. З цією метою сформульована математична постановка локальної задачі з оптимізації ресурсів інформаційної системи за кількісним критерієм. Задача розв’язана шляхом обчислення раціональних об’ємів інформації та внесення їх в опис ресурсів інформаційної системи. Враховуючи зростання об’ємів, розмаїття задач, які висуваються до...