ОСОБЕННОСТИ ПРИМЕНЕНИЯ ПОЛНОМОЧНОЙ МОДЕЛИ РАЗГРАНИЧЕНИЯ ДОСТУПА В СОВРЕМЕННЫХ СРЕДСТВАХ ЗАЩИТЫ ИНФОРМАЦИИ ОТ НЕСАНКЦИОНИРОВАННОГО ДОСТУПА

Resultado de la investigación: Articlerevisión exhaustiva

Resumen

This article describes the features of mandatory access control model in unauthorized access data protection tools, which can affect its efficiency. Also, some flaws of unauthorized access data protection tools and possible scenarios of unauthorized access bypassing these tools are analyzed. The countermeasures and methods of its application, eliminating detected flaws are offered. The conclusions about necessarity of analyze of unauthorized access data protection tools policies and revision of its severeness, if it is necessary, were made.
Título traducido de la contribuciónTHE FEATURES OF MANDATORY ACCESS CONTROL MODEL IN MODERN UNAUTHORIZED ACCESS DATA PROTECTION TOOLS
Idioma originalRussian
Páginas (desde-hasta)27-33
Número de páginas7
PublicaciónВестник УрФО. Безопасность в информационной сфере
N.º3 (37)
DOI
EstadoPublished - 2020

GRNTI

  • 81.00.00 GENERAL AND COMPLEX PROBLEMS OF TECHNICAL AND APPLIED SCIENCES AND BRANCHES OF THE NATIONAL ECONOMY

Level of Research Output

  • VAK List

Huella

Profundice en los temas de investigación de 'ОСОБЕННОСТИ ПРИМЕНЕНИЯ ПОЛНОМОЧНОЙ МОДЕЛИ РАЗГРАНИЧЕНИЯ ДОСТУПА В СОВРЕМЕННЫХ СРЕДСТВАХ ЗАЩИТЫ ИНФОРМАЦИИ ОТ НЕСАНКЦИОНИРОВАННОГО ДОСТУПА'. En conjunto forman una huella única.

Citar esto