ISSN 1991-2927
 

ACP № 1 (59) 2020

Certification of Systems, Facilities of Communications, Information Security and Software As Per Information-security Requirements

Vadim Georgievich Eryshov, Military Communications Academy named after S. Budenny, Candidate of Engineering, graduated from and finished his doctoral studies at the Military Communications Academy named after S. Budenny; Associate Professor of the Chair Radio-Electronics Protection, Security of Communications and Information at the Military Communications Academy; author of textbooks, articles and inventions in the field of electromagnetic compatibility of military-purpose radio-electronics facilities, monitoring of communications and information security as well as monitoring of information security against its leakage through technical channels. [e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it. ]V. Eryshov,

Andrey Sergeevich Korsunky, FRPC OJSC RPA Mars, Candidate of Engineering, graduated from the Faculty of Radio-Communications at Ulyanovsk branch of the Military Communications University, finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer of FRPC OJSC RPA Mars; author of articles and inventions in the field of radio-electronics protection, communications and information security. [e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it. .]A. Korsunky,

Sergey Anatolyevich Smolin, FRPC OJSC RPA Mars, Graduated from the Faculty of Mechanics and Mathematics at Ulyanovsk State University; head of a research laboratory at FRPC OJSC RPA Mars; author of articles in certification in the field of information security. [e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it. ]S. Smolin

Certification of Systems, Facilities of Communications, Information Security and Software As Per Information-security Requirements 24_14.pdf

The article researches a certification process as per requirements of information security in order to detect probability and time dependences of events and states of the process. It reveals the got dependences which can be used for the estimation of effectiveness of the operation of existing systems in certification, and development of improvement suggestions.

Certification, markovian processes, information security, certification-process model.

© FRPC JSC 'RPA 'Mars', 2009-2018 The web-site runs on Joomla!