Open Access
МЕТОД АНАЛІЗУ РИЗИКІВ ДОСТУПУ ДО АКТИВІВ В СИСТЕМАХ ФІЗИЧНОГО ЗАХИСТУ
Author(s) -
Ахмед Валід Аль-Хафаджі,
Олександр Олександрович Соловйов,
Дмитро Дмитрович Узун,
Вячеслав Сергійович Харченко
Publication year - 2019
Publication title -
radìoelektronnì ì komp'ûternì sistemi
Language(s) - English
Resource type - Journals
eISSN - 2663-2012
pISSN - 1814-4225
DOI - 10.32620/reks.2019.4.11
Subject(s) - computer science , physical security , asset (computer security) , object (grammar) , security analysis , computer security model , novelty , computer security , distributed computing , theoretical computer science , artificial intelligence , philosophy , theology
The subject of study in the article is asset access risk analysis methods inside a physical object. As an example, we consider the object of the physical security system of a scientific institution (as a block of a territorial element) with a hardware environment in the form of devices with low energy consumption and functioning in the Internet of things. The goal is to create a theoretical and mathematical model and method for analyzing the internal components of a security system and access to assets. The tasks set to cover the development of an approach to the analysis of the level of security, which is ensured by the established system of physical security and the formation of an approach to penetration to access assets. In solving the problems, methods were used such as spatial analysis of the physical distribution of system elements, the formation of route graphs, decomposition of blocks and physical protection algorithms, the study of a complete set of components and an individually oriented security element. The following results were obtained: an approach to the analysis of the security level of a physical object using basic parameters consisting of physical and information variables of existing multiple assets was developed, a mathematical model of the system components, block orientation of the perimeter of the object was built, a sequence of stages of penetration into a protected object using multiple routes was proposed. Conclusions: the scientific novelty of the results is as follows: the method of analyzing asset security through the use of environment variables and physical security controls of the facility, as well as the generation and evaluation of penetration routes to the facility to access critical assets, has been improved.