
TO THE CONCEPT OF A PROTECTED OPERATION SYSTEM
Author(s) -
Oleksii Bychkov
Publication year - 2019
Publication title -
bezpeka ìnformacìjnih sistem ì tehnologìj
Language(s) - English
Resource type - Journals
ISSN - 2707-1758
DOI - 10.17721/ists.2019.1.42-51
Subject(s) - computer security , computer science , security information and event management , information security management , information security , access control , secrecy , security policy , information security standards , information security management system , security controls , security management , information system , scope (computer science) , standard of good practice , security testing , classified information , security service , computer security model , software security assurance , cloud computing security , control (management) , engineering , network security policy , operating system , cloud computing , programming language , artificial intelligence , electrical engineering
At the present stage of the use of information technologies in society, the issue of information protection becomes important. Operating systems play a major role in this. They are assigned the role of protectors of all user data and access rights. The authors of the article were tasked with proposing a classification of the use of operating systems and with the requirements for mechanisms of protection of information under this classification. In the article: - the existing security standards that are implemented in modern operating systems are analyzed. Existing security standards are outlined (Trusted Computer System Evaluation Criteria «Orange Book», TCSEC, ISO 17799). In the Orange Book, a trusted system is defined as "a system that uses sufficient hardware and software to provide simultaneous processing of information of varying secrecy by a group of users without violating access rights." Security mechanisms and security classes of modern operating systems and BS 7799 security management model are also considered; this standard contains a systematic, complete, universal list of safety regulators, useful for the organization of almost any size, structure and scope information security management system. The standard Information Security Management System (ISMS) refers to the proportion of the overall risk-based management system designed to design, implement, control, maintain and improve information security activities. This system consists of organizational structures, policies, planning actions, responsibilities, procedures, processes and resources; - the analysis of the mechanisms of the complex system of information security (CSIS) and security, which are implemented in modern operating systems; - classification of operating system usage variants in information and telecommunication systems is offered. Requirements for information security mechanisms for operating systems according to the proposed classification are defined; - requirements for operating system information security standard and requirements for OS security mechanisms within the usage class are proposed