Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies
The paper presents the results of the analysis of scientific and technical literature and open regulatory and administrative documents of the international, Federal and departmental levels devoted to the process of functioning of information protection systems (SPI) from unauthorized access (UA) in...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2020-06-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/1267 |
id |
doaj-af870fde8abf4d308d3eaa9512fd2322 |
---|---|
record_format |
Article |
spelling |
doaj-af870fde8abf4d308d3eaa9512fd23222020-11-25T02:36:39ZengMoscow Engineering Physics Institute Bezopasnostʹ Informacionnyh Tehnologij2074-71282074-71362020-06-0127261710.26583/bit.2020.2.011185Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodiesAnna V. Batskih0Irina G. Drovnikova1Evgeni A. Rogozin2Voronezh Institute of the Ministry of the InteriorVoronezh Institute of the Ministry of the InteriorVoronezh Institute of the Ministry of the InteriorThe paper presents the results of the analysis of scientific and technical literature and open regulatory and administrative documents of the international, Federal and departmental levels devoted to the process of functioning of information protection systems (SPI) from unauthorized access (UA) in automated systems (AS) at the objects of Informatization of internal Affairs bodies (ATS). Using the example of a typical certified SPI from UA «Strazh NT 4.0» the functionality of SPI from UA operating in protected ATS is analyzed, shortcomings are identified and the key aspects of improving subsystems of access control systems based on the use of new information and telecommunication technologies related to improving real security as on the objects of Informatization Department are defined. As a promising technology additional biometric authentication based on realization of recognition of the access subject on individual dynamics of a keyboard set (keyboard handwriting) is offered.https://bit.mephi.ru/index.php/bit/article/view/1267information protection, information security system, access control subsystem, unauthorized access, authenticate users, keyboard handwriting. |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Anna V. Batskih Irina G. Drovnikova Evgeni A. Rogozin |
spellingShingle |
Anna V. Batskih Irina G. Drovnikova Evgeni A. Rogozin Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies Bezopasnostʹ Informacionnyh Tehnologij information protection, information security system, access control subsystem, unauthorized access, authenticate users, keyboard handwriting. |
author_facet |
Anna V. Batskih Irina G. Drovnikova Evgeni A. Rogozin |
author_sort |
Anna V. Batskih |
title |
Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies |
title_short |
Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies |
title_full |
Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies |
title_fullStr |
Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies |
title_full_unstemmed |
Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies |
title_sort |
аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies |
publisher |
Moscow Engineering Physics Institute |
series |
Bezopasnostʹ Informacionnyh Tehnologij |
issn |
2074-7128 2074-7136 |
publishDate |
2020-06-01 |
description |
The paper presents the results of the analysis of scientific and technical literature and open regulatory and administrative documents of the international, Federal and departmental levels devoted to the process of functioning of information protection systems (SPI) from unauthorized access (UA) in automated systems (AS) at the objects of Informatization of internal Affairs bodies (ATS). Using the example of a typical certified SPI from UA «Strazh NT 4.0» the functionality of SPI from UA operating in protected ATS is analyzed, shortcomings are identified and the key aspects of improving subsystems of access control systems based on the use of new information and telecommunication technologies related to improving real security as on the objects of Informatization Department are defined. As a promising technology additional biometric authentication based on realization of recognition of the access subject on individual dynamics of a keyboard set (keyboard handwriting) is offered. |
topic |
information protection, information security system, access control subsystem, unauthorized access, authenticate users, keyboard handwriting. |
url |
https://bit.mephi.ru/index.php/bit/article/view/1267 |
work_keys_str_mv |
AT annavbatskih analysisoftheprocessoffunctioningofsubsystemsofaccesscontrolsystemstoprotectinformationfromunauthorizedaccessandbasicaspectstheirperfectioninautomatedsystemsofinternalaffairsbodies AT irinagdrovnikova analysisoftheprocessoffunctioningofsubsystemsofaccesscontrolsystemstoprotectinformationfromunauthorizedaccessandbasicaspectstheirperfectioninautomatedsystemsofinternalaffairsbodies AT evgeniarogozin analysisoftheprocessoffunctioningofsubsystemsofaccesscontrolsystemstoprotectinformationfromunauthorizedaccessandbasicaspectstheirperfectioninautomatedsystemsofinternalaffairsbodies |
_version_ |
1724798957149749248 |