RUS  ENG
Full version
JOURNALS // Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics // Archive

Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2010 Number 2, Pages 149–152 (Mi vagtu196)

COMPUTER SOFTWARE AND COMPUTING EQUIPMENT

Analysis of modern threats to information security occurring while the network interaction

G. V. Babenko

Astrakhan State Technical University

Abstract: The classification of information security threats from networking was based on the general scheme of networking, networks location, network infrastructure components relative to potential offenders. Furthermore, three classes of vulnerable parts of the system (software, hardware, man-made) were identified for convenience. The structuring method of objectives and functions was used for the analysis. According to it, the set of vulnerable sections and security threats is represented as a system of six levels, where the upper components — goals, and the bottom ones — functions, except for the level of the life cycle. The result is a system, where each vulnerable part can be compared with the list of threats to information security.

Keywords: vulnerability, network interaction, threats to information security, structuring of objectives and functions, operation system, network infrastructure, means of information security, privacy, availability, integrity.

UDC: 004.7.056

Received: 12.03.2010



© Steklov Math. Inst. of RAS, 2026