ОСОБЕННОСТИ ПРИМЕНЕНИЯ ПОЛНОМОЧНОЙ МОДЕЛИ РАЗГРАНИЧЕНИЯ ДОСТУПА В СОВРЕМЕННЫХ СРЕДСТВАХ ЗАЩИТЫ ИНФОРМАЦИИ ОТ НЕСАНКЦИОНИРОВАННОГО ДОСТУПА

Translated title of the contribution: THE FEATURES OF MANDATORY ACCESS CONTROL MODEL IN MODERN UNAUTHORIZED ACCESS DATA PROTECTION TOOLS

Research output: Contribution to journalArticlepeer-review

Abstract

This article describes the features of mandatory access control model in unauthorized access data protection tools, which can affect its efficiency. Also, some flaws of unauthorized access data protection tools and possible scenarios of unauthorized access bypassing these tools are analyzed. The countermeasures and methods of its application, eliminating detected flaws are offered. The conclusions about necessarity of analyze of unauthorized access data protection tools policies and revision of its severeness, if it is necessary, were made.
Translated title of the contributionTHE FEATURES OF MANDATORY ACCESS CONTROL MODEL IN MODERN UNAUTHORIZED ACCESS DATA PROTECTION TOOLS
Original languageRussian
Pages (from-to)27-33
Number of pages7
JournalВестник УрФО. Безопасность в информационной сфере
Issue number3 (37)
DOIs
Publication statusPublished - 2020

GRNTI

  • 81.00.00 GENERAL AND COMPLEX PROBLEMS OF TECHNICAL AND APPLIED SCIENCES AND BRANCHES OF THE NATIONAL ECONOMY

Level of Research Output

  • VAK List

Fingerprint

Dive into the research topics of 'THE FEATURES OF MANDATORY ACCESS CONTROL MODEL IN MODERN UNAUTHORIZED ACCESS DATA PROTECTION TOOLS'. Together they form a unique fingerprint.

Cite this