ОСОБЕННОСТИ ПРИМЕНЕНИЯ ПОЛНОМОЧНОЙ МОДЕЛИ РАЗГРАНИЧЕНИЯ ДОСТУПА В СОВРЕМЕННЫХ СРЕДСТВАХ ЗАЩИТЫ ИНФОРМАЦИИ ОТ НЕСАНКЦИОНИРОВАННОГО ДОСТУПА

科研成果: Article同行评审

摘要

This article describes the features of mandatory access control model in unauthorized access data protection tools, which can affect its efficiency. Also, some flaws of unauthorized access data protection tools and possible scenarios of unauthorized access bypassing these tools are analyzed. The countermeasures and methods of its application, eliminating detected flaws are offered. The conclusions about necessarity of analyze of unauthorized access data protection tools policies and revision of its severeness, if it is necessary, were made.
投稿的翻译标题THE FEATURES OF MANDATORY ACCESS CONTROL MODEL IN MODERN UNAUTHORIZED ACCESS DATA PROTECTION TOOLS
源语言Russian
页(从-至)27-33
页数7
期刊Вестник УрФО. Безопасность в информационной сфере
3 (37)
DOI
Published - 2020

GRNTI

  • 81.00.00 GENERAL AND COMPLEX PROBLEMS OF TECHNICAL AND APPLIED SCIENCES AND BRANCHES OF THE NATIONAL ECONOMY

Level of Research Output

  • VAK List

指纹

探究 'ОСОБЕННОСТИ ПРИМЕНЕНИЯ ПОЛНОМОЧНОЙ МОДЕЛИ РАЗГРАНИЧЕНИЯ ДОСТУПА В СОВРЕМЕННЫХ СРЕДСТВАХ ЗАЩИТЫ ИНФОРМАЦИИ ОТ НЕСАНКЦИОНИРОВАННОГО ДОСТУПА' 的科研主题。它们共同构成独一无二的指纹。

引用此