ISSN 1991-2927
 

ACP № 1 (59) 2020

Author: "Sergey Anatolyevich Smolin"

Alexey Sergeevich Markov, Research-and-Production Association Eshelon, JSC, Candidate of Engineering, Associate Professor at the Chair Information Security at Bauman Moscow State Technical University, CISSP, SBCI; Director General of Research-and-Production Association Eshelon, JSC; interested in testing and certifying of software as per requirements of information security, software reliability. [e-mail: mail@npo-echelon.ru]A. Markov,

Valentin Leonidovich Tsirlov, Research-and-Production Association Eshelon, JSC, Candidate of Engineering, Associate Professor at the Chair Information Security at Bauman Moscow State Technical University, CISSP, AMBCI; Executing Chief Manager of Research-and-Production Association Eshelon, JSC; interested in audit of security and formal verification of software and computer-aided systems, control of information security. [e-mail: mail@npo-echelon.ru]V. Tsirlov,

Sergey Anatolyevich Smolin, FRPC OJSC RPA Mars, Graduated from the Faculty of Mechanics and Mathematics at Ulyanovsk State University; head of a research laboratory at FRPC OJSC RPA Mars; author of articles in certification in the field of information security. [e-mail: mars@mv.ru]S. Smolin,

Andrey Sergeevich Korsunky, FRPC OJSC RPA Mars, Candidate of Engineering, graduated from the Faculty of Radio-Communications at Ulyanovsk branch of the Military Communications University, finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer of FRPC OJSC RPA Mars; author of articles and inventions in the field of radio-electronics protection, communications and information security. [e-mail: aksspb@mail.ru]A. Korsunky

Modern Methods of Certification Tests of Software Codes Without Source Codes 24_13.pdf

The article researches features of state-of-the-art systems of software development from the point of view of audit of security and certification tests of software without source codes. It also shows possible detection of vulnerability, bookmarks and errors as well as development of certification-test reports for the programming environments JVM (Java) and .NET (C#).

Software, vulnerability, not declared capabilities, certification, information security, security audit.

2011_ 2

Sections: Telecommunications systems and computer networks

Subjects: Information systems.


Vadim Georgievich Eryshov, Military Communications Academy named after S. Budenny, Candidate of Engineering, graduated from and finished his doctoral studies at the Military Communications Academy named after S. Budenny; Associate Professor of the Chair Radio-Electronics Protection, Security of Communications and Information at the Military Communications Academy; author of textbooks, articles and inventions in the field of electromagnetic compatibility of military-purpose radio-electronics facilities, monitoring of communications and information security as well as monitoring of information security against its leakage through technical channels. [e-mail: eryshov@mail.ru]V. Eryshov,

Andrey Sergeevich Korsunky, FRPC OJSC RPA Mars, Candidate of Engineering, graduated from the Faculty of Radio-Communications at Ulyanovsk branch of the Military Communications University, finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer of FRPC OJSC RPA Mars; author of articles and inventions in the field of radio-electronics protection, communications and information security. [e-mail: aksspb@mail.ru.]A. Korsunky,

Sergey Anatolyevich Smolin, FRPC OJSC RPA Mars, Graduated from the Faculty of Mechanics and Mathematics at Ulyanovsk State University; head of a research laboratory at FRPC OJSC RPA Mars; author of articles in certification in the field of information security. [e-mail: mars@mv.ru]S. Smolin

Certification of Systems, Facilities of Communications, Information Security and Software As Per Information-security Requirements 24_14.pdf

The article researches a certification process as per requirements of information security in order to detect probability and time dependences of events and states of the process. It reveals the got dependences which can be used for the estimation of effectiveness of the operation of existing systems in certification, and development of improvement suggestions.

Certification, markovian processes, information security, certification-process model.

2011_ 2

Sections: Telecommunications systems and computer networks

Subjects: Information systems.


Sergey Anatolyevich Smolin, [e-mail: mars@mv.ru]S. Smolin,

Andrey Sergeevich Korsunsky, [e-mail: mars@mv.ru]A. Korsunsky

About Certification in the Information-security Field 19_4.pdf

The article investigates a issues of certification in the field of information security. It deals with an approach to certification procedure in the field of information security, contributing to reasoning of quantitative factors of certification-system efficiency.

Certification, attestation, information security.

2010_ 1

Sections: Theoretical issues of automation of command and control processes

Subjects: Automated control systems.


© FRPC JSC 'RPA 'Mars', 2009-2018 The web-site runs on Joomla!