Previous Page  20 / 21 Next Page
Information
Show Menu
Previous Page 20 / 21 Next Page
Page Background

А.Г. Андреев, Г.В. Казаков, В.В. Корянов

20

Инженерный журнал: наука и инновации

# 7·2017

Method for assessing safety functions durability

of the security facility of an automated spacecraft

flight control system

© A.G. Andreev

1

, G.V. Kazakov

1

, V.V. Koryanov

2

1

Federal State Budget Institution the 4

th

Central Research Institute

of the Ministry of Defence of the Russian Federation,

Korolev town, Moscow Region, 141091, Russia

2

Bauman Moscow State Technical University, Moscow, 105005, Russia

A significant number of risk factors affect the automated spacecraft flight control system

(ASFCS). To effectively neutralize these factors, it is necessary to assess the sensitivity

and stability of the information security facility of the ASFCS. For different security clas-

ses of such systems, it is necessary to define basic functional safety indicators. We rely on

the notion of security functions durability, and for its evaluation we introduce strict defi-

nitions of the basic concepts: the mechanism of protection, security facility, reliability of

control, sensitivity and durability of information security facility. For the security coeffi-

cient, which is an indicator of the durability of information security facility, we obtained

an analytical expression. Using the standard model of the threat counteraction process,

we solved the task of determining some tentative values of type 2 error probabilities for

the security facility. Furthermore, we assessed the priorities of the information security

facility, which enabled us to obtain a variational series of type 2 error probability values,

and in certain cases to set the required values of such probabilities of the security facili-

ty. The application of the developed method makes it possible to assess the residual threat

impact on the information resources of the automated spacecraft flight control system. If the

residual risk is acceptable, then the stability of the protection mechanisms meets the require-

ments of the system's safety. Otherwise, it is necessary to use protection mechanisms with the

increased durability.

Keywords

: information security, threat localization, protection mechanism, threat neutrali-

zation, threat detection, threat prevention, security facility, durability of control system,

sensitivity of security facility

REFERENCES



Andreev A.G., Kazakov G.V., Koryanov V.V.

Inzhenernyy zhurnal: nauka

i innovatsii — Engineering Journal: Science and Innovation

, 2016, no. 7.

Available at:

http://dx.doi.org/10.18698/2308-6033-2016-7-1511



Borodakiy Yu.V., Dobrodeev A.Yu., Naschekin P.A., Butusov I.V.

Voprosy

kiberbezopasnosti

Cybersecurity issues

, 2014, no. 2 (3), pp. 2–9.



Markov A.S., Tsirlov V.L., Barabanov A.V.

Metody otsenki nesootvetstviya

sredstv zaschity informatsii

[Methods for assessing the inconsistency of infor-

mation secutiry facility]. Moscow, Radio i svyaz Publ., 2012, 192 p.



Tsirlov V.L.

Osnovy informatsionnoy bezopasnosti. Kratkiy kurs

[Fundamen-

tals of Information Security. A Short Course]. Rostov-na-Donu, Feniks Publ.,

2008, 254 p.



Polyanskiy D.A.

Otsenka zaschischennosti

[Security assessment]. Vladimir,

Vladimir State University Publ., 2005, 80 p.



Rukovodyaschiy dokument. Bezopasnost informatsionnykh tekhnologiy.

Polozhenie po obespecheniyu bezopasnosti v zhiznennom tsikle izdeliy