The paper suggests a method for confirming the pattern of information security system functioning. The method is based on calculating hash sums after the data passes through each required security element. A unique identifier is used for this purpose, assigned to each security element. Re-calculation of the hash sum of the entire data route for the automated system is performed after receiving data at the end-node. This al ows you to confirm or deny the correctness of the information security pattern for a particular end node of the system.
Translated title of the contribution A METHOD FOR CONFIRMING THE PATTERN OF INFORMATION SECURITY SYSTEM FUNCTIONING
Original languageRussian
Title of host publicationОБРАБОТКА, ПЕРЕДАЧА И ЗАЩИТА ИНФОРМАЦИИ В КОМПЬЮТЕРНЫХ СИСТЕМАХ '21
Subtitle of host publication сборник докладов
Place of PublicationСПб
PublisherСанкт-Петербургский государственный университет аэрокосмического приборостроения
Pages186-189
ISBN (Print)978-5-8088-1557-5
StatePublished - 2021
EventОБРАБОТКА, ПЕРЕДАЧА И ЗАЩИТА ИНФОРМАЦИИ В КОМПЬЮТЕРНЫХ СИСТЕМАХ - Санкт-Петербургский государственный университет аэрокосмического приборостроения, Санкт-Петербург, Russian Federation
Duration: 14 Apr 202122 Apr 2021

Conference

ConferenceОБРАБОТКА, ПЕРЕДАЧА И ЗАЩИТА ИНФОРМАЦИИ В КОМПЬЮТЕРНЫХ СИСТЕМАХ
Country/TerritoryRussian Federation
CityСанкт-Петербург
Period14/04/2122/04/21

    Research areas

  • COMPUTING SYSTEM, INFORMATION SECURITY SYSTEM, WAYS OF INFORMATION PROTECTION, FIREWALL PROTECTION, EFFECTIVENESS MONITORING

ID: 99788438