Basis for the formation of a simulation stand for modeling of violator’s actions in the protected information and telecommunication infrastructure
Published: 18.11.2013
Authors: Gerasimov A.A., Mozgovoy A.V., Pugachev K.A., Kuznetsov V.A.
Published in issue: #11(23)/2013
DOI: 10.18698/2308-6033-2013-11-1018
Category: Information technology | Chapter: Information Security
In the article approaches to the formation of a simulation stand for modeling of violator's actions in the protected information and telecommunication infrastructure are reviewed, the basic requirements to simulation stand are described. The main objectives and a list of threats to information security are identified. An idea of the composition of a simulation stand is presented. Architecture of a simulation stand and a brief description of the elements of its components are given.