The article presents analysis of various applications of the “pilot project” as a concept, describes
the procedure for the pilot projects implementation regarding ICS information security scope (critical
information infrastructure facilities). The article defines a term “pilot project” for the cybersecurity
field. The relevance of this study lies in the need to create security systems for the critical information
infrastructure of the Russian Federation, the key element of which is information protection tools that
have passed conformity assessment for use at specific facilities, taking into account the specifics of
their implementation, operation and threat model. The problem is that there is no unified understanding
of the targets and objectives of the pilot projects, in IT&OT industry. As the result of this there is
an overestimation of time spent on coordination and implementation of projects, including their targets,
objectives, a list of expected results and criteria for their evaluation. It also affects the selection
of specialists with the necessary qualifications. The article is based on the successfully experience in
pilot projects in accordance with the developed original methodology in 2017-19.
Continue...
|
|
№ 6(84)
20 december 2019 year
Rubric: Cyberphisical sequrity Authors: Semenov V., Lebedev I., Salakhutdinova K., Sukhoparov M. |
The article explores the task of determining information security state of autonomous objects using
the information obtained through a side acoustic channel. The basic prerequisites for using of external
independent monitoring systems for monitoring condition of objects at the risk of the influence
of threats to information security are considered. An experiment aimed at studying the functioning
parameters of unmanned vehicles in various functioning situations was performed. The appearance
and statistical characteristics of the signals, with the help of which it becomes possible to identify abnormal
deviations during the operation of unmanned vehicles, are shown. An algorithm of two- and
three-class classification of the states of the studied objects is presented. Analysis based on the obtained
sample is very sensitive to any changes in the software and hardware configuration. At the same
time, with a minimum time of accumulation of statistical information using the proposed approach
based on a given threshold, it becomes possible to determine the point at which the attack was began.
The proposed approach model implies the possibility of using various mathematical apparatus, statistical
methods, and machine learning to achieve specified indicators for assessing the state of information
security of an object.
Continue...
|
Deciding making on structure and volume of investment companies should be based on mathematical
models to make reasonable and reliable choice. Because of significant increase in electronic
transactions at stock market, traditional portfolio investment models are no longer applicable due to
need to process large amounts of constantly changing data, so other portfolio risk assessments are required.
In article is offered the approach consisting in application of rating the companies in model
of uniform distribution of the investment risk serving as alternative the model of minimization of risk
H. M. Markowitz. Much attention is paid to rating procedure, which is the author's development and
based on hierarchical analysis procedure of ranked indicators, taking into account their priority. The
stability of author's approach of rating construction on basis the analysis of results of exclusion the
least priority indicator was proved. Computational experiments were performed. In experiments were
used next indicators – output of production and profits of the largest (by output) of the companies of
Russia. Integral rating of companies was compiled, using which calculation the share structure of investment
was performed using the minimax criterion and additional condition on profitability. Author
recommends use the presented tools to compile an investment portfolio of shares the large companies
in Russia.
Continue...
|
|
№ 6(84)
20 december 2019 year
Rubric: Models and Methods Authors: Bulygina O. V., Kakatunova T., Kozlov P. |
The article proposes a new approach to the automatic analysis of short messages arriving at
Internet portals and e-mails of public authorities. The developed model allows to classify short
unstructured text documents in a lack of statistical information and a low degree of thematic
rubric intersection. The input data for the algorithm for constructing the model is the set of
rubrics and the training sample. Its result is fuzzy scales of significant words in thesaurus of
the rubrics, which ensures the correct presentation of the document characteristics and the
operation of the classification (rubrication) algorithm.
Continue...
|
№ 1(85)
19 february 2020 year
Rubric: Processes and systems modeling Authors: Yandybaeva N., Kondratov D. |
The description of the mathematical model for the analysis of the state and forecasting the national
security of the state is presented. The model is developed based on the system dynamics model. As
model variables, the model uses national security indicators of various countries of the world (BRICS,
UN). The model also uses external factors selected on the basis of correlation analysis and analysis
of interrelated time series that affect the modeled variables. To illustrate the cause-effect relationships
between the model variables, a digraph is constructed. The procedure for the formation of a mathematical
forecast model for a specific country using structural coefficients is shown. The adequacy of
the developed model was verified using retrospective data. The results of a computational experiment
with the developed model for the Russian Federation are presented: the process of setting up the model
is analyzed, the working areas of the model are highlighted, and the national security indicators of the
Russian Federation are forecasted until 2020. For the accumulation, processing, analysis of statistical
information necessary for the development of a forecast model and directly for forecasting the national
security indicators of the state, a computer simulation system was developed. The basis of the
computer simulation system is the «Program for modeling and forecasting the main indicators of national
security of the Russian Federation», developed in GUIDE MatLab. The methodology of using
the developed mathematical and software for the training of specialists in the field of national security
on the basis of the educational resources of the RANEPA is presented. The situational training center,
functioning on the basis of the Institute of Law and National Security of the RANEPA and the expertanalytical
center of the RANEPA, is designed to conduct an express analysis of the socio-economic,
political, demographic situation in the region / country; development of scenarios of socio-economic
and political development of the country; modeling of critical situations arising in the real economic,
social, political systems of the country.
Continue...
|
Issues which make engineers choose and use work time organizing systems are reviewed in this article. In addition, an overview of modern applications from this segment is provided and a notes system is proposed as a simple and effective tool to increase workflow effectiveness. And finally, requirements, model and development principles for an application to solve all these issues are described. The application was developed on the basis of the Spring Boot framework with partial use of the Domain Driven Development ideas. It has a good level of code coverage by autotests due to using the Test Driven Development. For posting of source codes in the Internet, the GitHub repository and the free open source software GPL v3 license have been chosen. The developed organizer helps to avoid waste of time for searching old data in case of work resumption under tickets suspended some time ago due to systematization of all required information, files and sub tasks. Regular using of the organizer makes it possible to increase efficiency of a software engineer’s and the whole development team’s work through minimization of time taken by routine operations connected with search for and use of project related information. Continue... |