POST-INCIDENT INTERNAL AUDIT PROCEDURE OF COMPUTER DEVICES
Annotation
The paper presents post-incident internal audit procedure of computer equipment. It enables to study computer incidents in various computer equipment (including several ones simultaneously) in the conditions of a constant increasing number of computer incidents, the volume of stored and processed information. Information about computer incidents is obtained by analyzing data in volatile and non-volatile memory, and network traffic. The problem is solved by analyzing the attributes and their values obtained from the post-incident computer equipment and resources. The technique of complex internal data audit is presented. This approach (analysis of attributes and their values) reduces the time costs. This technique includes data processing, description of the interrelationships, the usage of intelligent methods and algorithms. The descriptions of these elements, their notations and functional purposes are presented. Calculation of the proposed technique computational complexity is given. The technique can be used to examine computer incidents. It reduces time costs for study, improves accuracy and increases information content of the post-incident internal audit of computer equipment. The proposed solutions can be used to develop proactive protection systems against computer incidents.
Keywords
Постоянный URL
Articles in current issue
- TWO-LENS AFOCAL COMPENSATOR FOR THERMAL DEFOCUS CORRECTION OF CATADIOPTRIC SYSTEM
- ATMOSPHERE PRESSURE EFFECT ON THE FIBER OPTIC GYROSCOPE OUTPUT SIGNAL
- CONTROL OF SCATTERING IN OPTICAL FIBER BY FIBER TWIST
- ALGORITHM FOR MOBILE ROBOT CROSS COUNTRY MOTION
- ALGORITHM FOR RESONANCE CONTROL OF IRON MASS FRACTION IN MAGNETITE ORE
- THEORETICAL ANALYSIS OF DYNAMIC SELECTION OF SWITCHING AUXILIARY OBJECTIVES ON XdivK PROBLEM
- ON RESTORATION OF SMEARED COLOR IMAGES
- IMAGE QUALITY ENHANCEMENT BY PROCESSING OF VIDEO FRAMES WITH DIFFERENT EXPOSURE TIME
- AUTOMATIC SECURITY ANALYSIS OF INFORMATION SYSTEMS INDEPENDENTLY OF FORMAL SPECIFICATIONS
- SECURITY MODEL OF MOBILE MULTI-AGENT ROBOTIC SYSTEMS WITH COLLECTIVE MANAGEMENT
- ANOMALY DETECTION IN WIRELESS SENSOR NETWORKS OF «SMART HOME» SYSTEM
- EFFECTIVENESS OF STEGANALYSIS BASED ON MACHINE LEARNING METHODS
- IMPROVED VISUAL ODOMETRY METHOD FOR SIMULTANEOUS UNMANNED AERIAL VEHICLE NAVIGATION AND EARTH SURFACE MAPPING
- FAST TEST ZONE SEARCH ALGORITHM FOR INTERFRAME ENCODING
- TREE SIMILARITY ESTIMATION BY CALCULATION OF pq-GRAM DISTANCE
- GENERATING DATASETS FOR THE BINARY CLASSIFICATION TASK BASED ON THEIR CHARACTERISTIC DESCRIPTIONS
- PARAMETER INTERVALITY OF REMOTE CONTROL SYSTEMS GENERATED WITH ERROR DETECTION MODE IN COMMUNICATION CHANNEL
- HEAT TRANSFER IN A CAVITY WITH ROTATING DISK IN TURBULENT REGIME
- MATHEMATICAL AND NUMERICAL MODELING OF FREE TURNING SEGMENTS OF SELF-REGULATED STATIC-DYNAMIC GAS BEARING
- NUMERICAL ANALYSIS METHODS OF SOFTWARE TEST EFFICIENCY
- ON THE SIMULATION PARADIGM ANALYSIS
- SMART LASER HEAD
- NEW DESIGN METHOD OF OUTPUT ROBUST CONTROL ALGORITHMS