Preview

Proceedings of the Southwest State University

Advanced search

The effectiveness of the Centralized Use of Digital Technologies, Information Resources and Information Protection Tools in Government by the Example of the Republic of Tyva

https://doi.org/10.21869/2223-1560-2019-23-6-99-114

Abstract

Purpose of research. The purpose of this study is to assess the possibility of applying the methodology for centralized management of systems and information risks using the example of informatization of public departments of Republic of Tyva in order to optimize the cost of purchasing technical, software and hardware-software means of protecting information, as well as the payroll of maintenance technical personnel.

Methods. One of the main research methods is the creation of an experimental model of the mechanism of a single information and computing network, combining various government departments located within the same administrative building, which allows working simultaneously with distributed or centralized applications, databases and other services, as well as centralized information risk management security. The next research method is the analysis and study of the principle of operation of information resources, information systems, databases, and the increase in the number of domain users if they are combined into a single data transfer network. The interaction and effectiveness of personnel, a specialized unit based on one government agency, ensuring the regular functioning of the network and the necessary level of information security for all government departments.

Results. As a result, an economic effect is achieved by eliminating the acquisition of duplicate software and hardware information protection, increasing the efficiency of using unified information services, and creating a centralized structural unit that uses risk management tools and makes information security management decisions based on the principles of system analysis , structuring method and expert survey methods. The results of the study have been used in solving problems of improving the information security management system of the authorities of Republic of Tyva.

Conclusion. We have developed the original information technology architecture of the information security management system and centralized use of information technologies for the government of Republic of Tyva. The distinctive features of the structure of software tools for the centralized approach are the multi-agent implementation of the control elements of the decision support system and the integration of various types of security management models into a single complex. 

About the Authors

B. S. Dongak
Altai State Technical University named after I.I. Polzunova (AlSTU)
Russian Federation

Buyan S. Dongak, Post-Graduate Student, Department of Informatics, Computer Engineering and Information Security

Barnaul



A. S. Shatohin
Altai State Technical University named after I.I. Polzunova (AlSTU)
Russian Federation

Aleksandr S. Shatohin, Cand. of Sci.  (Engineering), Associate Professor, Department of Informatics, Computer Engineering and Information Security

Barnaul



R. V. Meshcheryakov
Russian Academy of Sciences, Institute of Management Problems named after V.A. Trapeznikova RAS
Russian Federation

Roman V. Meshcheryakov, Dr. of Sci. (Engineering), Professor, Chief Researcher at Laboratory 80

Moscow



References

1. Volkov D.V. Imitatsionnoe mul'tiagentnoe modelirovanie sistemy svyazi spetsial'nogo naznacheniya [Simulation of multi-agent modeling of a special-purpose communication system”]. International Journal of Advanced Studies, 2017, vol. 7, no. 1-2, pp. 31-37 (In Russ.).

2. Oleynik A., Fridman A., Masloboev A. Informational and analytical support of the network of intelligent situational centers in Russian Arctic. CEUR Workshop Proceedings, 2018, vol. 2109, pp. 57-64.

3. Oliveira R., Ribeiro M., Vieira A. ELPC-CMAC: An enhanced cooperative mac protocol for broadband plc systems. Computer networks, 2019, vol. 153, pp. 11-22. ISSN: 13891286.

4. Mohamad Noor M., Hassan W. Current research on internet of things (IOT) security: A survey. Computer networks, 2019, vol. 148, pp. 283-294. ISSN: 1389-1286.

5. Vyalyi M., Khuziev I. Fast protocols for leader election and spanning tree construction in a distributed network. Problems of information transmission, 2017, vol. 53, no. 3, pp. 183-201.

6. Nazarova Y., Bozhko Y. Development of it-infrastructure for the providing system of educational process in sparsely populated areas of the arctic zone of the Russian Federation. CEUR Workshop Proceedings, 2018, vol. 2109, pp. 49-56.

7. El-Shekeil I., Pal A., Kant K. Precession: Progressive recovery and restoration planning of interdependent services in enterprise data centers. Digital communications and networks, 2019, vol. 4, pp. 39-47. ISSN: 2468-5925.

8. Arutyunov V. Clustering of information-security standards of the Russian Federation. Scientific and technical information processing, 2017, vol. 44, no. 2, pp. 125-133.

9. Yayla A, Lei Y. Information security policies and value conflict in multinational companies. Information and computer security, 2018,vol. 26, pp. 230-245. ISSN: 2056-4961.

10. Dongak B.S. Monitoring setevoi aktivnosti avtomatizirovannykh rabochikh mest sotrudnikov organizatsii [Monitoring the network activity of automated workplaces of organization employees]. Bezopasnost' informatsionnykh tekhnologii = Information Technology Security, 2018, pp. 71-79. ISSN 2074-7136 (In Russ.).

11. Lokhin S.V., Semashko A.V. Monitoring setevoi aktivnosti personala v tselyakh obespecheniya informatsionnoi bezopasnosti predpriyatiya [Monitoring network activity of personnel in order to ensure information security of the enterprise]. Voprosy zashchity informatsii = Issues of information security, 2017, no. 2 (117), рр. 53-57 (In Russ.).

12. Meshcheryakov R.V., Shelupanov A.A. Kontseptual'nye voprosy informatsionnoi bezopasnosti regiona i podgotovki kadrov [Conceptual issues of information security of the region and training]. Trudy SPIIRAN = Proceedings of SPIIRAS, 2014, no. 3 (34), pp. 136159 (In Russ.).

13. Vasilyev V., Sulavko A., Zhumazhanova S., Borisov R. Identification of the psychophysiological state of the user based on hidden monitoring in computer systems. Scientific and technical information processing, 2018, vol. 45, no. 6, pp. 398-410.

14. Mikhailovskaya N.G. Tsentry upravleniya informatsionnoi bezopasnost'yu [Information Security Management Centers]. Bezopasnost' informatsionnykh tekhnologii = Security of information technology, 2016, no. 4, pp. 38-51 (In Russ.).

15. Jiang J., Wen S., Liu B., Yu S., Zhou W., Xiang Y. Malicious attack propagation and source identification. Advances in information security, 2019, vol. 73, pp. 1-192. ISSN: 1568-2633.

16. Khodashinsky I.A., Meshcheryakov R.V., Gorbunov I.V. Metody nechetkogo izvlecheniya znanii v zadachakh obnaruzheniya vtorzhenii [Fuzzy methods of knowledge extraction in intrusion detection tasks]. Voprosy zashchity informatsii = Issues of information security, 2012, no. 1, pp. 45-50 (In Russ.).

17. Abrosimov M.B., Kamil I.A. Razrabotka sistemy predotvrashcheniya vtorzhenii s ispol'zovaniem parallel'nogo programmirovaniya i sistemy otkazoustoichivosti [Development of an intrusion prevention system using parallel programming and a fault tolerance system]. Bezopasnost' informatsionnykh tekhnologii = Security of information technology, 2018, no. 1 (25), pp. 65-73 (In Russ.).

18. Filyak P.Y. Information security in the context of the digital economy [Information security in the context of the digital economy]. CEUR Workshop Proceedings, 2018, vol. 2109, pp. 25-30.

19. Norkin V. B&B Method for discrete partial order optimization. Computational management science, 2019, pp. 165-170. ISSN: 1619-697X.

20. Tokarev M.V. Mul'tiagentnyi podkhod k planirovaniyu resursov [Multi-agent approach to resource planning]. Sbornik XIX mezhdunarodnoi nauchno-metodicheskoi konferentsii "Informatika: problemy, metodologiya, tekhnologii" [Collection of the XIX international scientific-methodical conference “Informatics: problems, methodology, technologies”. Voronezh, 2019, pp. 1757-1760 (In Russ.).

21. Prelov V. On some optimization problems for the renin divergence. Problems of information transmission, 2018, vol. 54, no. 3, pp. 229-244.

22. Serebrjanik I.A., Druzhinina A.V. IP-telefoniya dlya biznesa: ekonomicheskii aspekt [IP-telefonija dlja biznesa: jekonomicheskij aspekt]. Aktual'nye problemy gumanitarnykh i estestvennykh nauk = Actual Problems of Humanities and Natural Sciences, 2014, no.5, pt. 1, pp.255-257 (In Russ.).


Review

For citations:


Dongak B.S., Shatohin A.S., Meshcheryakov R.V. The effectiveness of the Centralized Use of Digital Technologies, Information Resources and Information Protection Tools in Government by the Example of the Republic of Tyva. Proceedings of the Southwest State University. 2019;23(6):99-114. (In Russ.) https://doi.org/10.21869/2223-1560-2019-23-6-99-114

Views: 670


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2223-1560 (Print)
ISSN 2686-6757 (Online)