Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies

The paper presents the results of the analysis of scientific and technical literature and open regulatory and administrative documents of the international, Federal and departmental levels devoted to the process of functioning of information protection systems (SPI) from unauthorized access (UA) in...

Full description

Bibliographic Details
Main Authors: Anna V. Batskih, Irina G. Drovnikova, Evgeni A. Rogozin
Format: Article
Language:English
Published: Moscow Engineering Physics Institute 2020-06-01
Series:Bezopasnostʹ Informacionnyh Tehnologij
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/1267
id doaj-af870fde8abf4d308d3eaa9512fd2322
record_format Article
spelling doaj-af870fde8abf4d308d3eaa9512fd23222020-11-25T02:36:39ZengMoscow Engineering Physics Institute Bezopasnostʹ Informacionnyh Tehnologij2074-71282074-71362020-06-0127261710.26583/bit.2020.2.011185Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodiesAnna V. Batskih0Irina G. Drovnikova1Evgeni A. Rogozin2Voronezh Institute of the Ministry of the InteriorVoronezh Institute of the Ministry of the InteriorVoronezh Institute of the Ministry of the InteriorThe paper presents the results of the analysis of scientific and technical literature and open regulatory and administrative documents of the international, Federal and departmental levels devoted to the process of functioning of information protection systems (SPI) from unauthorized access (UA) in automated systems (AS) at the objects of Informatization of internal Affairs bodies (ATS). Using the example of a typical certified SPI from UA «Strazh NT 4.0» the functionality of SPI from UA operating in protected ATS is analyzed, shortcomings are identified and the key aspects of improving subsystems of access control systems based on the use of new information and telecommunication technologies related to improving real security as on the objects of Informatization Department are defined. As a promising technology additional biometric authentication based on realization of recognition of the access subject on individual dynamics of a keyboard set (keyboard handwriting) is offered.https://bit.mephi.ru/index.php/bit/article/view/1267information protection, information security system, access control subsystem, unauthorized access, authenticate users, keyboard handwriting.
collection DOAJ
language English
format Article
sources DOAJ
author Anna V. Batskih
Irina G. Drovnikova
Evgeni A. Rogozin
spellingShingle Anna V. Batskih
Irina G. Drovnikova
Evgeni A. Rogozin
Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies
Bezopasnostʹ Informacionnyh Tehnologij
information protection, information security system, access control subsystem, unauthorized access, authenticate users, keyboard handwriting.
author_facet Anna V. Batskih
Irina G. Drovnikova
Evgeni A. Rogozin
author_sort Anna V. Batskih
title Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies
title_short Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies
title_full Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies
title_fullStr Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies
title_full_unstemmed Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies
title_sort аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies
publisher Moscow Engineering Physics Institute
series Bezopasnostʹ Informacionnyh Tehnologij
issn 2074-7128
2074-7136
publishDate 2020-06-01
description The paper presents the results of the analysis of scientific and technical literature and open regulatory and administrative documents of the international, Federal and departmental levels devoted to the process of functioning of information protection systems (SPI) from unauthorized access (UA) in automated systems (AS) at the objects of Informatization of internal Affairs bodies (ATS). Using the example of a typical certified SPI from UA «Strazh NT 4.0» the functionality of SPI from UA operating in protected ATS is analyzed, shortcomings are identified and the key aspects of improving subsystems of access control systems based on the use of new information and telecommunication technologies related to improving real security as on the objects of Informatization Department are defined. As a promising technology additional biometric authentication based on realization of recognition of the access subject on individual dynamics of a keyboard set (keyboard handwriting) is offered.
topic information protection, information security system, access control subsystem, unauthorized access, authenticate users, keyboard handwriting.
url https://bit.mephi.ru/index.php/bit/article/view/1267
work_keys_str_mv AT annavbatskih analysisoftheprocessoffunctioningofsubsystemsofaccesscontrolsystemstoprotectinformationfromunauthorizedaccessandbasicaspectstheirperfectioninautomatedsystemsofinternalaffairsbodies
AT irinagdrovnikova analysisoftheprocessoffunctioningofsubsystemsofaccesscontrolsystemstoprotectinformationfromunauthorizedaccessandbasicaspectstheirperfectioninautomatedsystemsofinternalaffairsbodies
AT evgeniarogozin analysisoftheprocessoffunctioningofsubsystemsofaccesscontrolsystemstoprotectinformationfromunauthorizedaccessandbasicaspectstheirperfectioninautomatedsystemsofinternalaffairsbodies
_version_ 1724798957149749248