Adaptation of protection facilities to the set level in social information systems

Author(s) Collection number Pages Download abstract Download full text
Durniak B. V., Khometa T. M. № 2 (72) 36-44 Image Image

The analysis of reasons has been conducted in a process of work which stipulate the necessity of adaptation of the access system to the information social system. For realization of the adaptation process not only parameters are important that are related directly to the access but also parameters which characterize the process of access in general. Determinations of different types of adaptation and determination of access security level are brought in a process of work and other factors that influence the access security have been researched.

Keywords: adaptation, authentication, identifier, profile, system of protection of SZD access, attacks, registration number, password, social information electronic complex CIEK, system of SA administrator, authority of a user.

  • 1. Medvedkovskyi, V., Suyanov, P., & Leonov, D. (1999). Ataka na Internet. Moskva: DMK (in Russian).
  • 2. Brag, R. (2001). Systema bezopasnosti Windows 2000. Moskva: Izdatelskyi Dom «Vilson» (in Russian).
  • 3. Zyma, V., Moldavian, A., & Moldavian, N. (2000). Bezopasnost globalnykh setevykh tekhnologiy. Sankt-Peterburh, SPB-BHV (in Russian).
  • 4. Smith, R. (2002). Autentifikaciya: ot paroley do otkrytykh kluchey. Moskva: Izdatelskyi Dom «Vilson» (in Russian).
  • 5. Blek, U. (2001). Internet, protokoly, bezopasnost. Sankt-Peterburh: Piter (in Russian).