Abstract:
Graph models occupy an important place in problems related to information security. Finite dynamic system $(\Gamma_G, \alpha)$ is considered, the states of which are all possible orientations of a given graph $G$, and the evolutionary function $\alpha$ transforms a given state $\overrightarrow{G}$ by reversing all arcs in $\overrightarrow{G}$ that go into sinks, and there are no other differences between the given $\overrightarrow{G}$ and the next $\alpha(\overrightarrow{G})$ states. The paper suggests how this system can be used for information security, namely: as a model for ensuring audit and monitoring the state of an object under the influence of threats to its information security, and investigating information security incidents in automated information systems, as a model for managing the continuous operation of systems and system recovery, countering denials of service, as a technology for identifying and authenticating users and subjects of information processes, and an access control system.