Life Cycle Models for Data System of Onboard Device with Counteraction to Unauthorized Access
Authors: Generalov D.N., Shlegel, Pyrkin N.N. | Published: 03.11.2013 |
Published in issue: #4(81)/2010 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: data system, life cycle, algorithm, unauthorized access, data protection |
The algorithm of development and selection of the optimal variant of protection against the insider's attacks during the simulation of the data system's life cycle of the built-in onboard devices is proposed. The results of the theoretical study and analysis of the model with the intermediate check, the cascade and spiral life-cycle models for the data system with counteraction to insider's attack are given. The efficiency of the developed algorithm is shown for executing the step of selection of the optimal protection variant and for counteracting the insider's threats.