Physics, mathematics, and technology

2021 Issue №1

Features of preparation of an active audit of information security of the process control system

Abstract

The problems that arise when setting the tasks of active audit of infor­mation security of automated control systems for technological processes when using data transmission in real time at the enterprise are considered. The features of the methodology for determining the safe active audit of auto­mated process control systems when they work together with other systems are indicated. The features of determining the parameters of a secure audit of multi-level APCS are considered.

Download the article

Automated training system for studying the complex of radio monitoring and signal analysis

Abstract

The article proposes ways and principles of creating automated training systems using the example of a training program for studying a radio moni­toring and signal analysis complex (Kassandra class) for training information security specialists, which can be used by educational organizations and training centers conducting training in this area.

Download the article

Features of the formation of TEMPEST in a computer keyboard from the point of view of ensuring information security

Abstract

The paper analyzes the possibilities of the formation of spurious electro­magnetic radiation and interference in computer keyboards with the ps/2 in­terface, which can lead to information leaks. The dependences of the physical parameters of the PEMIN on the design features of the equipment used are es­tablished. Possible channels of unauthorized information retrieval, through the use of TEMPEST, are analyzed. Recommendations for the safe use of ps/2 keyboards in information systems are formed.

Download the article