|

Life Cycle Models for Data System of Onboard Device with Counteraction to Unauthorized Access

Authors: Generalov D.N., Shlegel, Pyrkin N.N. Published: 03.11.2013
Published in issue: #4(81)/2010  
DOI:

 
Category: Informatics & Computing Technology  
Keywords: data system, life cycle, algorithm, unauthorized access, data protection

The algorithm of development and selection of the optimal variant of protection against the insider's attacks during the simulation of the data system's life cycle of the built-in onboard devices is proposed. The results of the theoretical study and analysis of the model with the intermediate check, the cascade and spiral life-cycle models for the data system with counteraction to insider's attack are given. The efficiency of the developed algorithm is shown for executing the step of selection of the optimal protection variant and for counteracting the insider's threats.