ISSN 1991-2927
 

ACP № 1 (55) 2019

Author: "Vadim Georgievich Eryshov"

Andrey Sergeevich Korsunsky, FRPC OJSC ’RPA ’Mars’, Candidate of Engineering; graduated from the Faculty of Radio-Communications at Ulyanovsk branch of the Military Communications University; finished his post-graduate studies at the Military Communications Academy named after S. Budenny; Chief Specialist at FRPC OJSC ’RPA ’Mars’; author of articles and inventions in the field of radio-electronics protection, communications and information security as well as information transport through wireless channels. [e-mail: aksspb@mail.ru]A. Korsunsky,

Tatiana Nikolaevna Maslennikova, FRPC OJSC ’RPA ’Mars’, Candidate of Engineering; graduated from the Faculty of Radio-Engineering of Ulyanovsk Polytechnic Institute; Head of a research-and-development laboratory at FRPC OJSC ’RPA ’Mars’; author of papers and publications in the field of information support of special-purpose computer-aided systems [e-mail: mars@mv.ru]T. Maslennikova,

Vadim Georgievich Eryshov, Military Communications Academy, [e-mail: eryshov@mail.ru]V. Eryshov

A Simulation Model of an Information Security Analysis System in Computer-aided Systems 32_2.pdf

The article deals with a simulation model of an information security analysis system in computer-aided systems processing the confidential information. Hereafter, the dependences obtained while modeling can form a basis for the analysis of the existing information security analysis systems and for synthesis of new ones.

Information security analysis system, computer-aided system, queuing system, exposure scanner, simulation model.

2013_ 2

Sections: System analysis, data management and processing

Subjects: Automated control systems, Computer-aided engineering, Information systems.


Andrey Sergeevich Korsunsky, Federal Research-and-Production Center Open Joint-Stock Company 'Research-and-Production Association 'Mars', Candidate of Engineering; graduated from the Faculty of Radio-Communications of Ulyanovsk branch of the Military Communications University; finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer at Federal Research-and-Production Center 'Research-and-Production Association 'Mars'; author of articles and inventions in the field of radioelectronic protection, communications and information security as well as data transmission through wireless communications channels of infotelecommunication systems. [e-mail: aksspb@mail.ru]A. Korsunsky,

Vadim Georgievich Eryshov, Military Communications Academy named after S. Budenny, Candidate of Engineering; graduated from the Military Communications Academy named after S. Budenny; finished his doctoral studies at the Military Communications Academy; Associate Professor at the Chair 'Radioelectronic Protection, Communications and Information Security' of the Military Communications Academy; author of text-books, articles and inventions in the field of electromagnetic compatibility of military-purpose radioelectronic facilities, monitoring of communications and information security as well as that of information security against its leakage through technical channels. [e-mail: eryshov@mail.ru]V. Eryshov

Protection of Infotelecommunication Systems in Information and Psychological Warfare 26_12.pdf

The article deals with an approach to the protection of infotelecommunication systems in information and psychological warfare. The suggested approach contributes to anticipating system reconfiguration on basis of the analysis of enemy operations. The re-configuration results in the decrease of the efficiency of infotelecommunication system cracking by affecting sides and in the saving of required values of subscriber-service timeliness.

Infotelecommunication system, information and psychological warfare, information security, re-configuration, simulation.

2011_ 4

Sections: Telecommunications systems and computer networks

Subjects: Automated control systems.


Vadim Georgievich Eryshov, Military Communications Academy named after S. Budenny, Candidate of Engineering; graduated from the Military Communications Academy named after S. Budenny; finished his doctoral studies at the Military Communications Academy; Associate Professor at the Chair Radio-Electronics Protection, Security of Communications and Information of the Military Communications Academy; author of text-books, articles and inventions in the field of electromagnetic compatibility of militarypurpose radio-electronics facilities, monitoring of communications and information security as well as monitoring of information security against its leakage through technical channels. [e-mail: eryshov@mail.ru]V. Eryshov,

Andrey Sergeevich Korsunky, FRPC OJSC RPA Mars, Candidate of Engineering; graduated from the Faculty of Radio-Communications at Ulyanovsk branch of the Military Communications University; finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer at FRPC OJSC RPA Mars; author of articles and inventions in the field of radio-electronics protection, communications and information security. [e-mail: aksspb@mail.ru]A. Korsunky,

Andrey Petrovich Vashchenko, General Staff of the Armed Forces of the Russian Federation, graduated from Ulyanovsk Higher Military Communications Command College, the Military Communications Academy named after S. Budenny; senior officer at a department of the 8th Agency of the General Staff of the Armed Forces of the Russian Federation; author of articles in the field of communications and information security as well as in the field of control of processes of data transfer via communications channels of computer-aided information systems. [e-mail: VAP-1973-06-11@yandex.ru]A. Vashchenko

A Method of the Creation of Intelligence-resistant Communications System 25_10.pdf

The article deals with a method for the creation of an intelligence-resistance communications system which contributes to the increase of the protection level for military-purpose communications systems by ensuring the least contrast for the space of disclosure attributes due to uniform change of their information values.

Intelligence resistance, communications system, information security, disclosure attributes, information value, technical intelligence, common network of electrical communications.

2011_ 3

Sections: Information-protection methods and systems, information security

Subjects: Automated control systems, Information systems.


Vadim Georgievich Eryshov, Military Communications Academy named after S. Budenny, Candidate of Engineering, graduated from and finished his doctoral studies at the Military Communications Academy named after S. Budenny; Associate Professor of the Chair Radio-Electronics Protection, Security of Communications and Information at the Military Communications Academy; author of textbooks, articles and inventions in the field of electromagnetic compatibility of military-purpose radio-electronics facilities, monitoring of communications and information security as well as monitoring of information security against its leakage through technical channels. [e-mail: eryshov@mail.ru]V. Eryshov,

Andrey Sergeevich Korsunky, FRPC OJSC RPA Mars, Candidate of Engineering, graduated from the Faculty of Radio-Communications at Ulyanovsk branch of the Military Communications University, finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer of FRPC OJSC RPA Mars; author of articles and inventions in the field of radio-electronics protection, communications and information security. [e-mail: aksspb@mail.ru.]A. Korsunky,

Sergey Anatolyevich Smolin, FRPC OJSC RPA Mars, Graduated from the Faculty of Mechanics and Mathematics at Ulyanovsk State University; head of a research laboratory at FRPC OJSC RPA Mars; author of articles in certification in the field of information security. [e-mail: mars@mv.ru]S. Smolin

Certification of Systems, Facilities of Communications, Information Security and Software As Per Information-security Requirements 24_14.pdf

The article researches a certification process as per requirements of information security in order to detect probability and time dependences of events and states of the process. It reveals the got dependences which can be used for the estimation of effectiveness of the operation of existing systems in certification, and development of improvement suggestions.

Certification, markovian processes, information security, certification-process model.

2011_ 2

Sections: Telecommunications systems and computer networks

Subjects: Information systems.


Yury Ivanovich Starodubtsev, Military Communications Academy named after S. Budenny, Doctor of Military Sciences, Professor, graduated from the Kemerovo Command Communications Academy, the Military Communications Academy named after S. Budenny; Honoured Scientist of the Russian Federation, Academician of the Russian Academy of Military Sciences, Academy of Security and Legal Order, the Russian Academy of Natural Sciences, Academy Arctic of Sciences; honorary worker in higher vocational education; holds the Chair Radio-Electronics Protection, Security of Communications and Information at the Military Communications Academy named after S. Budenny; author of monographs, text-books, articles and inventions in the field of protection of information resources of military-communications systems and C2 systems under information-war conditions. [e-mail: vas@mail.ru]Y. Starodubtsev,

Vadim Georgievich Eryshov, Military Communications Academy named after S. Budenny, Candidate of Engineering, graduated from the Military Communications Academy named after S. Budenny, finished his doctoral studies at the Military Communications Academy; Associate Professor of the Chair Radio-Electronics Protection, Security of Communications and Information at the Military Communications Academy; author of text-books, articles and inventions in the field of electromagnetic compatibility of military-purpose radio-electronics facilities, monitoring of communications and information security as well as monitoring of information security against leakage through technical channels. [e-mail: eryshov@mail.ru]V. Eryshov,

Andrey Sergeevich Korsunsky, FRPC OJSC RPA Mars, Candidate of Engineering, graduated from the Faculty of Radio-Communications at the Ulyanovsk branch of the Military Communications University, finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer of FRPC OJSC 'RPA 'Mars'; author of articles and inventions in the field of radio-electronics protection, communications and information security. [e-mail: aksspb@mail.ru]A. Korsunky

Model for Process of Information-security Monitoring in Information and Telecommunication Systems 23_8.pdf

The article studies an aspect of information opposition - monitoring of information security in information and telecommunications systems, and deals with a model of information security in information and telecommunication systems on basis of the Markovian-process theory.

Monitoring of information security, information and telecommunication system, markovian processes.

2011_ 1

Sections: Information-protection methods and systems. information security

Subjects: Automated control systems, Mathematical modeling.


© FRPC JSC 'RPA 'Mars', 2009-2018 The web-site runs on Joomla!