PRECEDENT DEFINITION OF CONFIGURATION PARAMETERS THAT ENSURE THE IMPLEMENTATION OF INFORMATION SECURITY MEASURES

Main Article Content

Анна Павловна ГОЛУШКО
Вадим Геннадьевич ЖУКОВ

Abstract

The article is devoted to the scientific and practical problem of determining the configuration parameters of information infrastructure and its information security system, which could provide counteraction to modern methods of computer attacks. It is proposed to use MITRE ATT&CK matrices as a source of systemized analysis of computer attacks. The article presents the analysis results of systematized source applicability, advantages and limitations, an approach to integration into determining the of configuration parameters and evaluating the effectiveness of security system.

Article Details

Section
Methods and systems of information protection, information security
Author Biographies

Анна Павловна ГОЛУШКО

Postgraduate student, Information Technologies Security Department, Reshetnev Siberian State University of Science and Technology. 660037, Krasnoyarsk Territory, Krasnoyarsk, avenue named after the newspaper “Krasnoyarsky Rabochiy”, 31.

Вадим Геннадьевич ЖУКОВ

Candidate of Technical Sciences, Associate Professor of the Department of Information Technology Security, Reshetnev Siberian State University of Science and Technology. 660037, Krasnoyarsk Territory, Krasnoyarsk, avenue named after the newspaper “Krasnoyarsky Rabochiy”, 31.