Features of the implementation of the security policy of the distance course

Authors

  • Vadim A. Shujgin Ufa State Aviation Technical University
  • Gaziz D. Shugurov Ufa State Aviation Technical University
  • Sapiiat Z. Magomedova ITMO National Research University
  • Danila A. Radaikin Lomonosov Moscow State Universit
  • Kirill G. Griaznov Russian State Agrarian University — K. A. Timiryazev Agricultural Academy

DOI:

https://doi.org/10.25726/h2261-5220-4977-z%20

Keywords:

security policy, distance learning, technical protection, information security

Abstract

Ensuring information security remotely of the course provides for the creation of a system to protect its information resources from intruders who want to use, modify or simply destroy these resources. Information security is understood as "the state of information security, in which its confidentiality, accessibility and integrity are ensured. The complex nature of the protection problem suggests that a combination of legislative, organizational, and software and technical measures is necessary to solve it. Knowledge of possible threats, as well as vulnerabilities of the information system, is necessary in order to choose the most effective means of ensuring security. One of the most dangerous and frequent are unintentional errors of users, operators, system administrators and other persons serving information systems. Sometimes such errors lead to direct losses (incorrectly entered data, an error in the program that caused the system to stop or collapse). Sometimes they create weaknesses (most often due to administrative errors) that can be exploited by attackers. The second place in terms of damage is occupied by theft and falsification. In most cases, the perpetrators turned out to be full-time employees  of organizations who were well acquainted with the working hours and protective measures. The key stage for building a reliable information system is the development of a security policy. There are several definitions of this concept.

References

Валянский С.И. Теория информации и образование. Условия выживания России. М.: АИРО-ХХ; «Крафт+», 2005. 140 с. http://internat.msu.ru/wp-content/uploads/2013/08/%D0%A2%D0%B5%D0%BE%D1%80%D0%B8%D1%8F_ %D0%B8%D0%BD%D1%84%D0%BE%D1%80%D0%BC.pdf

Галямова Е.В., Павлов Ю.Н. История науки «Теория информации» / МГТУ им. Н.Э. Баумана. М., 2017. http://engineering-science.ru/doc/48780.html

ГенДокс. Информационные технологии в управлении. 2009. http://gendocs.ru/v39822/?cc=6

Журавлев Ю.И. Фундаментально-математический и общекультурный аспекты школьной информатики // Вопросы образования. 2005. № 3. https://vo.hse.ru/2005--3/27044703. html

Научно-исследовательская лаборатория «Бизнес-школа информационных технологий». Теоретические основы информатики. Имитационное моделирование: Исходные понятия информатики. https:// it.rfei.ru/course/~uibT/~GInfy6uu

Семенов А.Л. Качество информатизации школьного образования // Вопросы образования. 2005. https://vo.hse. ru/2005--3/27044823.html

Урсул А.Д. Природа информации. М., 1968. http://inion.ru/site/assets/files/1474/ursul_a_d_priroda_informacii.pdf

Шеннон К., Уивер Л. Математическая теория связи. М.: Физматгиз, 1956. С. 46. https://books.google.ru/books?id = lo__AgAAQBAJ&pg=PA398&lpg=PA398&dq

Шершнева В.А. Формирование математической компетентности студентов инженерного вуза на основе полипарадигмального подхода: монография. Красноярск, 2011. https://search.rsl.ru/ru/record/01005420610

Эшби У.Р. Введение в кибернетику. М.: ИЛ, 1959. С. 27. http://publ.lib.ru/ARCHIVES/E/ESHBI_Uil'yam_Ross/_Eshbi_U.R..html

Published

2022-06-20

How to Cite

1.
Шуйгин ВА, Шугуров ГД, Магомедова СЗ, Радайкин ДА, Грязнов КГ. Features of the implementation of the security policy of the distance course. УО [Internet]. 2022Jun.20 [cited 2024Jul.3];12(5):248-54. Available from: https://emreview.ru/index.php/emr/article/view/450