z-logo
open-access-imgOpen Access
Development of the Security Subsystem within the System “The Network City. Education”
Author(s) -
Irina Rybina,
А O Кupriyanov,
Kristina Guzhakovskaya
Publication year - 2019
Publication title -
nbi tehnologii/nbi tehnologii
Language(s) - English
Resource type - Journals
eISSN - 2713-1564
pISSN - 2658-3593
DOI - 10.15688/nbit.jvolsu.2018.3.5
Subject(s) - architecture , process (computing) , task (project management) , work (physics) , computer security , computer science , automation , field (mathematics) , information system , engineering management , control (management) , information security , knowledge management , process management , engineering , systems engineering , mechanical engineering , art , mathematics , electrical engineering , artificial intelligence , pure mathematics , visual arts , operating system
“The Network City. Education” is a comprehensive information program project that allows educational institutions and municipal authorities to interact with each other at the city or city district level. This information system is designed to automate the educational process and management activities in the field of education, as it allows you to create a common educational space.To perform the task of automating the control over the educational structure, it is necessary to think over the solution not only for individual schools, but for all educational institutions.It assumes gradual automation of all educational institutions, with formation of the information environment for these institutions and regional governments on the basis of the coordinated information standards.The aim of this work is to develop a subsystem of security system “The Network City. Education”. The article analyzes the given information system and formulates a typical architecture of the information system, highlights its components. We also develop a security subsystem “The Network City” within the system “The Safety School”. Actual possible threats have been considered as the components of the developed standard architecture of the information system. Mechanisms of protection against the allocated threats are considered.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here