scholarly journals HIDDEN TECHNICAL CHANNELS OF INFORMATION LEAKAGE DEVELOPED IN COMPUTER EQUIPMENT: ANALYSIS OF THE REGULATORY AND METHODOLOGICAL FRAMEWORK, TERMINOLOGY

2021 ◽  
Vol 21 (1) ◽  
pp. 5-13
Author(s):  
S.V. Porshnev ◽  
◽  
D.O. Belyaev ◽  
Author(s):  
Claudia Teresa González-Ramírez ◽  
Leonardo Gómez-Martínez ◽  
José Manuel Colín-Morales ◽  
Mauricio Delgado-Pichardo

Considering that day by day most of the services provided by any organization are being migrated to environments that involve the use of computer equipment, servers and data networks, the multiple attacks suffered by companies, focused on theft, must also be considered. information, falsification, modification of services, impersonations, vulnerabilities in systems, among many things. Despite the great usefulness and all the advantages that networks offer, it cannot be left aside, much less assume that the security of the organization is in optimal conditions, concepts such as implementation, administration and computer security. Therefore, the company must have an Information Leakage Prevention security scheme, based on a security system with the tools that provide these advantages.


2020 ◽  
Vol 30 (4) ◽  
pp. 35-46
Author(s):  
S. V. Skryl ◽  
S. S. Nikulin ◽  
A. V. Mazin ◽  
V. I. Spivak ◽  
V. O. Krylov ◽  
...  

Formulation of the problem. The completeness of the characteristics of one of the most serious threats to the security of information today – its leakage through the transient electromagnetic pulse emanation standard (TEMPEST) from computer equipment (CE) is determined not only by the number of detectable signs of leakage but also by several other parameters characterizing the dynamics of the implementation of such a threat. The established patterns in the scenarios of violators’ actions associated with the use of technical reconnaissance equipment (TRQ) to intercept informative TEMPEST signals from computer equipment made it possible to form a model of all possible options for using TRQ to obtain confidential information processed by computer equipment. The proposed model provides the implementation of the methodological principles of the recognition theory for a more complete characterization of threats of information leakage through the channels of spurious electromagnetic radiation and interference from CE in the process of their detection.Objective. Development of methodological grounds for presenting signs of the violator’s implementation of certain functions associated with the use of technical reconnaissance equipment to intercept informative signals of spurious electromagnetic radiation and interference from computer equipment as signs that identify the most significant conditions for the recognition and prevention of such threats.Results. Methodological solutions for the identification of three states significant for the prevention of threats are given based on the structuring of the functional representation of the intruder’s actions to implement such threats. Mathematical models for assessing the predicted amount of information disclosed in the process of intercepting TEMPEST informative signals from computer equipment, and assessing the level of security threats in case of interception of information are also presented.Practical significance. The paper presents the main options for the operation of a complex of programs for recognizing threats of information leakage through TEMPEST channels from computer equipment developed within the framework of the presented methodology.


2020 ◽  
Vol 20 (4) ◽  
pp. 5-21
Author(s):  
S.V. Porshnev ◽  
◽  
D.O. Belyaev ◽  

In the process of functioning of computer equipment, technical channels of information leakage arise. Today, the list of technical channels of information leakage, as well as methods and means to combat leaks through these technical channels are regulated by the current regu-latory documentation in the field of technical information protection. However, it turns out that there are also a num-ber of technical channels of information leakage, measures to counteract which are not provided for by the current regulatory documents in the field of technical infor-mation protection. For the sake of brevity, this type of technical information leakage channels is called hidden technical information leakage channels.


2020 ◽  
pp. 93-102
Author(s):  
Fabrizio d'Aniello

The pre-eminent motivation behind this contribution lies in the intention to offer students of three-year degree course in education and training sciences and master's degree in pedagogical sciences of the University of Macerata a further support than those already existing, aimed at expanding the educational meaningfulness of the internship experience. The main criticality of such experience is connected with the difficulty in translating knowledge, models, ideas into appropriate activities. This notably refers to the conceptual and educational core of the sense of initiative and entrepreneurship and, consistently, to the skill to act. Therefore, after a deepening of the sense of initiative and entrepreneurship, followed by related pedagogical reflections based on the capability approach, the paper presents an operative proposal aimed at increasing young people's possibilities of action and supporting their personal and professional growth. With regard to this training proposal, the theoretical and methodological framework refers to the third generation cultural historical activity theory and to the tool of the boundary crossing laboratory, variant of the change laboratory


2018 ◽  
Vol 13 (1) ◽  
Author(s):  
Reza Hendriyantore

The effort to put good governance in development in Indonesia is basically not new. Since the Reformation, the transformation of closed government into an open government (inclusive) has begun to be pursued. Highlighting the conflicts in the land sector that tend to strengthen lately, there are some issues that have intensified conflicts in the field, such as the lack of guaranteed land rights in various legal and policy products. In this paper, a descriptive method is considered important in identifying the applicable issue and methodological framework for addressing governance issues in Indonesia. To reduce such agrarian conflicts between farmers and the government, and as an effort to increase farmers' income, all farmers are incorporated into agricultural cooperatives. Agricultural cooperatives are structured down to the National Level. Thus, farmers participate in good access to the marketing of agricultural produce.Keywords:good governance, agrarian conflict, agricultural cooperative


2020 ◽  
Vol 99 (5) ◽  
pp. 493-497
Author(s):  
M. M. Aslanova ◽  
T. V. Gololobova ◽  
K. Yu. Kuznetsova ◽  
Tamari R. Maniya ◽  
D. V. Rakitina ◽  
...  

Introduction. The purpose of our work was to justify the need to improve the legislative, regulatory and methodological framework and preventative measures in relation to the spread of parasitic infections in the provision of medical care. There is a wide range of pathogens of parasitic infestations that are transmitted to humans through various medical manipulations and interventions carried out in various medical institutions. Contaminated care items and furnishings, medical instruments and equipment, solutions for infusion therapy, medical personnel’s clothing and hands, reusable medical products, drinking water, bedding, suture and dressing materials can serve as a major factor in the spread of parasitic infections in the provision of medical care. Purpose of research is the study of the structure and SMP of parasitic origin, circulating on the objects of the production environment in multi-profile medical and preventive institutions of stationary type in order to prevent the occurrence of their spread within medical institutions. Material and methods. The material for the study was flushes taken from the production environment in 3 multi-profile treatment and prevention institutions of inpatient type: a multi-specialty hospital, a maternity hospital and a hospital specializing in the treatment of patients with intestinal diseases for the eggs of worms and cysts of pathogenic protozoa. Results. During the 2-year monitoring of medical preventive institutions, a landscape of parasitic contamination was found to be obtained from the flushes taken from the production environment objects in the premises surveyed as part of the research work. Discussions. In the course of research, the risk of developing ISMP of parasitic origin was found to be determined by the degree of epidemiological safety of the hospital environment, the number and invasiveness of treatment and diagnostic manipulations and various medical technologies. Conclusion. It is necessary to conduct an expert assessment of regulatory and methodological documents in the field of epidemiological surveillance and sanitary and hygienic measures for the prevention of medical aid related infections of parasitic origin, to optimize the regulatory and methodological base, to develop a number of preventive measures aimed at stopping the spread of parasitic infections in the medical network.


2020 ◽  
Vol 21 (2) ◽  
pp. 169-194
Author(s):  
Marta Kajzer-Wietrzny ◽  
Ilmari Ivaska

Empirical Translation Studies have recently extended the scope of research to other forms of constrained and mediated communication, including bilingual communication, editing, and intralingual translation. Despite the diversity of factors accounted for so far, this new strand of research is yet to take the leap into intermodal comparisons. In this paper we look at Lexical Diversity (LD), which under different guises, has been studied both within Translation Studies (TS) and Second Language Acquisition (SLA). LD refers to the rate of word repetition, and vocabulary size and depth, and previous research indicates that translated and non-native language tends to be less lexically diverse. There is, however, no study that would investigate both varieties within a unified methodological framework. The study reported here looks at LD in spoken and written modes of constrained and non-constrained language. In a two-step analysis involving Exploratory Factor Analysis and linear mixed-effects regression models we find interpretations to be least lexically diverse and written non-constrained texts to be most diverse. Speeches delivered impromptu are less diverse than those read out loud and the non-constrained texts are more sensitive to such delivery-related differences than the constrained ones.


Sign in / Sign up

Export Citation Format

Share Document