Author(s) | Collection number | Pages | Download abstract | Download full text |
---|---|---|---|---|
Durniak B. V., Khometa T. M. | № 2 (70) | 63-71 |
The choice of protection level for different types of information is studied. They are determined by the cost of means of protection processes, and cost of expenses which can be the result of decreasing of security level. Security level is defined on the basis of analysis of security means, or SB security system, which provides the relevant security level. The safety of each system is determined by the access protection from contiguous systems, users access protection, access protection through unauthorized ICS data links with external environment.
Keywords: authentication, identifier, cryptographic protocols, algorithms, data links, threat.