Preview

Herald of Dagestan State Technical University. Technical Sciences

Advanced search

A simulation model for identifying information security threats from low-frequency acoustoelectric transformations

https://doi.org/10.21822/2073-6185-2020-47-2-65-74

Abstract

Aim. The article considers the physical basis for the formation of a technical channel of information leakage due to low-frequency acoustoelectric transformations. Methods. The research was based on simulation modelling methods. The method of instrumental and computational control of the security of speech information in the considered channel of information leakage was applied. Results. Based on the developed simulation model, using the Model-View-Presenter design pattern, a software tool was developed. The main software classes implementing this model are presented. The functionality of the developed software tool is demonstrated and recommendations are given on the possible application of the developed simulation model for identifying threats to information security due to low-frequency acoustoelectric transformations. Conclusion. The developed simulation model can be used by security specialists at both large and small enterprises, which implement measures for ensuring information protection. The model creates conditions for its active implementation in the educational process of training specialists in the field of information security, using both traditional (contact work) and distance learning formats.

About the Authors

D. A. Korochentsev
Don State Technical University
Russian Federation

Denis A. Korechentsev - Dr. Sci.(Technical), Acting Head of the Department of Cybersecurity of Information Systems.

1 Gagarin Square, Rostov-on-Don 344000.

ORCID 0000-0002-4491-3376



L. V. Cherkesova
Don State Technical University
Russian Federation

Larisa V. Cherkesova - Dr. Sci.(Technical), Prof., Department of Cybersecurity of Information Systems.

1 Gagarin Square, Rostov-on-Don 344000.



K. A. Namavir
Don State Technical University
Russian Federation

Konstantin A. Namavir - Student, Department of Cybersecurity of Information Systems.

1 Gagarin Square, Rostov-on-Don 344000.



References

1. Buzov G.A., Kalinin S.V., Kondrat'yev A.V. Zashchita ot utechki informatsii po tekhnicheskim kanalam: Uchebnoye posobiye. -M.: Goryachaya liniya - Telekom, 2005. 416 s. [Buzov G. A., Kalinin S. V., Kondratyev A.V. Protection against information leakage through technical channels: the manual. - Moscow: Hotline-Telecom, 2005. 416 р. (In Russ)]

2. Volkov D.S., Kozlov A.O. Metodika otsenki zashchishchennosti sistem peredachi dannykh ot utechki rechevoy konfidentsial'noy informatsii po kanalam elektroakusticheskikh preobrazovaniy // Nauchnyy poisk. 2014. № 2.5, s. 4-6. [Volkov D. S., Kozlov A. O. Method of assessing the security of data transmission systems from leakage of speech confidential information through channels of electroacoustic transformations / / Scientific search. 2014. No. 2.5, pp. 4-6. (In Russ)]

3. Vremennaya metodika otsenki zashchishchennosti osnovnykh tekhnicheskikh sredstv i sistem...: Normativno-metodicheskiy dokument // Sbornik vremennykh metodik otsenki zashchishchennosti konfidentsial'noy informatsii ot utechki po tekhnicheskim kana-lam. - M.: Gostekhkomissiya Rossii, 2002. [A temporary method for assessing the security of basic hardware and systems...: Normative and methodological document / / Collection of temporary methods for assessing the security of confidential information from leakage through technical channels. - Moscow: State Technical Commission of Russia, 2002. (In Russ)]

4. GOST R 51275-2006. Zashchita informatsii. Ob"yekt informatizatsii. Faktory, vozdeystvuyushchiye na informatsiyu. Obshchiye polozheniya. - Vved. 01.02.2008 - M.: Standartinform, 2006. — 12 s [GOST R 51275-2006. Information protection. Object of Informatization. Factors that affect information. Generalities. - Yes. 01.02.2008-Moscow: STANDARTINFORM, 2006. 12 p. (In Russ)]

5. Durakovskiy A.P., Kunitsyn I.V., Lavrukhin YU.N. Kontrol' zashchishchennosti rechevoy informatsii v pomeshcheniyakh. At-testatsionnyye ispytaniya vspomogatel'nykh tekhnicheskikh sredstv i sistem po trebovaniyam bezopasnosti informatsii: Uchebnoye posobiye. - M.: NIYAU MIFI, 2015. - 152 s. [Durakovsky A. P., Kunitsyn I. V., Lavrukhin Yu. N. Control of speech information security in premises. Certification tests of auxiliary technical means and systems for information security requirements: Tutorial. - Moscow: niyau MEPhI, 2015. 152 p. (In Russ)]

6. Yemel'yanov S.L. Tekhnicheskaya razvedka i tekhnicheskiye kanaly utechki informatsii // Sistemy obrabot-ki informatsii. -2010. - Vyp. 3. - S. 20-23. [Emelyanov S. L. Technical intelligence and technical channels of information leakage / / information processing Systems. 2010. Vol. 3. pp. 20-23. (In Russ)]

7. Zheleznyak V. K., Makarov YU. K., Khorev A. A. Nekotoryye metodicheskiye podkhody k otsenke effektivnosti zashchity re-chevoy informatsii // Spetsial'naya tekhnika. - M.: 2000. № 4, s. 39-45. [Zheleznyak V. K., Makarov Yu. K., Horev A. A. Some methodological approaches to evaluating the effectiveness of speech information protection / / Special technique. Moscow: 2000. No. 4, pp. 39-45. (In Russ)]

8. Zaytsev A.P., Shelupanov A.A., Tekhnicheskiye sredstva i metody zashchity informatsii. M.: Mashinostroyeniye, 2009. - 507 s. [Zaitsev A. P., Shelupanov A. A., Technical means and methods of information protection. Moscow: Mashinostroenie, 2009. 507 p. (In Russ)]

9. Pavlovskiy YU.N. Imitatsionnyye modeli i sistemy / YU.N. Pavlovskiy. — M.: Fazis: VTS RAN, 2000. S. 134. [Pavlovsky Yu. N. Simulation models and systems / Yu. Pawlowski. - M.: fazis: VC RAS, 2000. P. 134. (In Russ)]

10. Development patterns: MVC vs MVP vs MVVM vs MVI / / URL: https://habr.com/ru/post/344184/

11. Skripnik D.A. Obshchiye voprosy tekhnicheskoy zashchity informatsii. URL http:// www. intuit. ru /goods_store/ebooks/8563 [Skripnik D. A. General issues of technical protection of information. URL http://www.intuit.ru/goods_store/ebooks/8563 (In Russ)]

12. Special requirements and recommendations for the protection of confidential information (PAGE-K), the state Commission of Russia. - Moscow: 2001.

13. Titov A.A. Inzhenerno-tekhnicheskaya zashchita informatsii: Uchebnoye posobiye dlya studentov spetsial'nostey «Organizatsiya i tekhnologiya zashchity informatsii», «Kompleksnaya zashchita ob"yektov informatizatsii» i «Informatsionnaya bezopasnost' telekom-munikatsionnykh sistem». - Tomsk: Tomsk. gos. un-t sistem upravleniya i radioelektroniki, 2010. - 197 s. [Titov A. A. Engineering and technical protection of information: A textbook for students of the specialties "Organization and technology of information protection", "Complex protection of information objects" and "information security of telecommunication systems". - Tomsk: Tomsk. state University of control systems and Radioelectronics, 2010. - 197 p. (In Russ)]

14. Torokin A.A. Inzhenerno-tekhnicheskaya zashchita informatsii. - M.: Gelios ARV, 2005 [Torokin A. A. Engineering and technical protection of information. - Moscow: Helios ARV, 2005(In Russ)]

15. Khalyapin D.B. Akustoelektricheskiye, akustopreobrazovatel'nyye kanaly utechki informatsii i voz-mozhnyye sposoby ikh po-davleniya. M.: «Mir bezopasnosti», № 5, s. 47-53 [Chaliapin D. B. Acoustoelectric, customsearchengine channels of information leakage and possible ways of their suppression. Moscow: "The world of security", no. 5, pp. 47-53(In Russ)]

16. Khorev A.A. Kontrol' effektivnosti zashchity vspomogatel'nykh tekhnicheskikh sredstv // Zashchita in-formatsii. Insayd. - Iz-datel'skiy dom «Afina», SPb.: 2009. - № 1, s. 42-52 [Horev A. A. Control of the effectiveness of protection of auxiliary technical means / / information Protection. Insider trading. - Publishing house "Athena", St. Petersburg.: 2009. No. 1, pp. 42-52(In Russ)]

17. Khorev A.A. Tekhnicheskiye kanaly utechki akusticheskoy (rechevoy) informatsii // Spetsial'naya tekhnika. - M.: 2009. - № 5, s. 12-26 [Horev A. A. Technical channels for leakage of acoustic (speech) information / / Special technique. - Moscow: 2009. No. 5, pp. 12-26 (In Russ)]

18. Khorev A.A., Zashchita informatsii ot utechki po tekhnicheskim kanalam. Chast' 1. Tekhnicheskiye kanaly utechki informatsii. -M.: Gostekhkomissiya RF, 1998. - 320 s. [Horev A. A., Protection of information from leakage through technical channels. Part 1. Technical channels for information leakage. - Moscow: state technical Commission of the Russian Federation, 1998. 320 p. (In Russ)]

19. Khorev A.A. Sposoby i sredstva zashchity informatsii. Uchebnoye posobiye. - M.: MO RF, 2000. - 316 s. [Horev A. A. Methods and means of information protection. Textbook. - Moscow: MO RF, 2000. 316 p. (In Russ)]

20. Common Software Architectural Patterns in a nutshell / Vijini Mallawaarachchi // Towards Data Science [Электронный ресурс] URL:https://towardsdatascience.com/10-common-software-architectural-pattems-m-a-nutsheU-a0b47a1e9013


Review

For citations:


Korochentsev D.A., Cherkesova L.V., Namavir K.A. A simulation model for identifying information security threats from low-frequency acoustoelectric transformations. Herald of Dagestan State Technical University. Technical Sciences. 2020;47(2):65-74. (In Russ.) https://doi.org/10.21822/2073-6185-2020-47-2-65-74

Views: 667


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2073-6185 (Print)
ISSN 2542-095X (Online)