scholarly journals REVIEW OF RESEARCH RESULTS ON HIDDEN TECHNICAL CHANNELS OF INFORMATION LEAKAGE PROCESSEDBY COMPUTER TECHNOLOGY

2020 ◽  
Vol 20 (4) ◽  
pp. 5-21
Author(s):  
S.V. Porshnev ◽  
◽  
D.O. Belyaev ◽  

In the process of functioning of computer equipment, technical channels of information leakage arise. Today, the list of technical channels of information leakage, as well as methods and means to combat leaks through these technical channels are regulated by the current regu-latory documentation in the field of technical information protection. However, it turns out that there are also a num-ber of technical channels of information leakage, measures to counteract which are not provided for by the current regulatory documents in the field of technical infor-mation protection. For the sake of brevity, this type of technical information leakage channels is called hidden technical information leakage channels.

Author(s):  
E. A. Rogozin ◽  
D. G. Silka ◽  
O. A. Gulyaev

Objectives. In order to determine the security of a special-purpose informatisation object, it is necessary to calculate the effectiveness indicators of information security (IS) measures aimed at preventing unauthorised access (UA) threats associated with information leakage through technical (acoustic) channels. In order to determine the actual channels of information leakage, it is necessary to develop a list of actions to neutralise potential threats, including the development of an information protection system for a special-purpose informatisation object.Method. A security assessment of the special-purpose informatisation object is carried out using expert documentary and instrumental methods.Results. The results of evaluating the indicators of protection against information leakage through the air (acoustic) channel are presented and aspects of improving special measures for protecting information at the special-purpose informatisation object are identified.Conclusion. Due to its relevance, the direction of this study requires further development of organisational and technical measures to implement the requirements of regulatory documents on the protection of information in special-purpose informatisation objects. 


2005 ◽  
Vol 64 (3) ◽  
pp. 227-237
Author(s):  
A. V. Zhizhelev ◽  
S. V. Zhilinskii ◽  
A. V. Klyshevskii ◽  
S. A. Golovin

1983 ◽  
Vol 27 (1) ◽  
pp. 1-5 ◽  
Author(s):  
Robert C. Williges

Advances in computer technology mark the beginning of an information revolution which will provide new challenges for human factors. Some of the new application areas that need to be considered include education, the working environment, and consumer services. Professional implications of computer technology for the Human Factors Society involve technical information exchange, professional training, and public awareness.


Author(s):  
Maryna Tsilyna

The purpose of the article is to establish the features and types of modern documentary information thathas intellectual value; finding out the principles on which to build a secure document flow; characteristics ofthe main technological stages and procedures for the implementation of confidential documents; identifyingthreats that may arise during this process. The methodology consisted of a set of general scientific, specialscientific and specific methods of studying the problem, the application of which allows to achieve the goal.Scientific intelligence was based on the principles of objectivity and integrity. The use of a set of scientificmethods made it possible to study the specifics of valuable documentary information, to find out the mainchannels of information leakage, to trace the stages of document circulation of such business papers. Scientificnovelty. The latest international practices of working with confidential documents are studied. Featuresand types of documentary information that has intellectual value for the entrepreneur are established. Theprinciples on which it is necessary to build a secure document flow are formulated. The main technologicalstages and procedures of execution of confidential documents are outlined. The main threats that may ariseduring this process have been identified. Conclusions. Confidential information allows any company to operatesuccessfully due to the security of information. The importance of such information determines the risk of itsloss. In order to avoid inconveniences related to the loss or theft of information, the institutions should createappropriate services, whose representatives monitor confidential information, document circulation, createdatabases for computers and files for paper media, destroy drafts of confidential documents, store and destroydocuments that are valuable in the prescribed manner.Keywords: execution of a confidential document, secrecy stamp, information protection, technologicalcomplexity, value of documentary information.


2021 ◽  
Vol 45 (1) ◽  
Author(s):  
A. S. Chechko ◽  

The problem of the description of artificially present industrial noises which are available at operation of personal computers is considered in work. These noises have both positive and negative effects when protecting the information typed by the user by means of the USB keyboard interface. The difficulties that arise in this case are due to the fact that the indirect radiation of electromagnetic fields is observed during the operation of all elements of computer technology. On the one hand, the presence of these noises distorts the useful signal, which in turn prevents the attacker from detecting reliable information that is transmitted. On the other hand, these noises prevent the creation of appropriate measures to ensure complete protection when typing by a user of a personal computer. The paper proposes to consider industrial noise in the form of three random processes, which are described by Johnson distributions.


Author(s):  
Denys Bakhtiiarov ◽  
Oleksandr Lavrynenko ◽  
Nataliia Lishchynovska ◽  
Ivan Basiuk ◽  
Tetiana Prykhodko

Methods for synthesis a structural diagram of the processes for detecting and locating technical information leakage channels are analysed. Software for defining a controlled room zone was also presented. A proprietary approach to search the electromagnetic environment under radio interference has been developed to detect devices for unauthorized control of acoustic information using microphones and transmission of this information using a radio channel.


2019 ◽  
Vol 9 ◽  
pp. 25-29
Author(s):  
Valentin Selifanov ◽  
Oksana Ermak ◽  
Anna Yakunina ◽  
Karina Yarkova

The process of the development of means of information protection can be divided into three stages: invention of writing, emergence of technical means of information processing and period of mass Informatization of society. Each stage is characterized by the development of information carriers, as a result of which there are new threats of information leakage. In this connection there is a necessity of formation of requirements to protection of information and information systems.


Sign in / Sign up

Export Citation Format

Share Document