Management of Rectification of the Consequences of an Emergency Situation

  • Authors

    • Andrey Klimentevich Chernykh
    • Sergey Arkadyevich Nefedyev
    • Evgenij Nikolaevich Bardulin
    • Vladislav Pavlovich Andreev
    • Olga Vladimirovna Stashevskaya
    https://doi.org/10.14419/ijet.v7i3.14.16906

    Received date: August 5, 2018

    Accepted date: August 5, 2018

    Published date: July 25, 2018

  • emergency situation, decision for emergency response, information systems, information threats, unauthorized access, information protection, malicious programs.
  • Abstract

    The purpose of the paper is to develop an information technology used to implement operational and quality management of rectification of the consequences of an emergency situation. Typical examples are given of malicious programs and the ways of their impact on the work of computers used to develop solutions for the elimination of the consequences of an emergency situation. To prevent unauthorized access to computers and their infection with malicious programs, preventive measures are recommended. The novelty of the paper is the development of an information technology to recover the encrypted or blocked by malicious programs data necessary to develop solutions for the elimination of the consequences of an emergency situation and the concept of building a fragment of an information system within which this information technology should be implemented. The authors consider an approach to the improvement of the information system for officials of the management bodies of the Ministry of Emergency Situations of Russia, developing a solution for the relief of the consequences of an emergency situation, which provides the protection of their personal computers from malicious programs.

  • References

    1. Ivanov, D. Emm, F. Sinitsyn, S. Pontiroli. Kaspersky Security Bulletin 2016. Syuzhet goda. Programmy-vymogateli: revolyutsiya [Kaspersky Security Bulletin 2016. The Plot of the Year. Extortion Programs: Revolution]. https://securelist.ru/analysis/ksb/29788/kaspersky-security-bulletin-2016-story-of-the-year/. Revised December 21, 2016. Ac-cessed June 27, 2018.
    2. M. Sconzo, R. Valdez. Advanced Threat Protection, Detection and Response, Endpoint and Server Security, Prevention, Ran-somware, Response, Tech Toolbox. Carbon Black. https://www.carbonblack.com/2016/03/25/threat-alert-powerware-new-ransomware-written-in-powershell-targets-organizations-via-microsoft-word/. Revised March 25, 2016. Accessed June 27, 2018.
    3. N.N. Moshak, K.V. Evseiko, A.V. Logintsev, Problemy zashchity informatsionno-telekommunikatsionnoi infrastruktury RF ot kiberatak [Problems of Protection of the Information and Telecommunications Infrastructure of the Russian Federation from Cyberattacks], Regionalnaya informatika i informatsionnaya bezopasnost. Sbornik nauchnykh trudov [Regional Informatics and Information Security. Collection of Scientific Papers], St. Petersburg Society of Informatics, Computer Engineering, Communica-tion and Control Systems, St. Petersburg, 2017, 31-36.
    4. O.Yu. Piyukov, I.V. Gvozdkov, Obespechenie bezopasnosti informatsionnykh resursov obrazovatelnykh uchrezhdenii [Ensuring the Security of Information Resources of Educational Institutions], Regionalnaya informatika i informatsionnaya bezopasnost. Sbornik nauchnykh trudov [Regional Informatics and Information Security. Collection of Scientific Papers], St. Petersburg Socie-ty of Informatics, Computer Engineering, Communication and Control Systems, St. Petersburg, 2017, 44-46.
    5. A.V. Shipilova, Modelirovanie uyazvimostei v sisteme bezopasnosti [Modeling of Vulnerabilities in the Security System], Region-alnaya informatika i informatsionnaya bezopasnost. Sbornik nauchnykh trudov [Regional Informatics and Information Security. Collection of Scientific Papers], St. Petersburg Society of Informatics, Computer Engineering, Communication and Control Sys-tems, St. Petersburg, 2017, 74-77.
    6. V.I. Kuvatov, A.I. Primakin, (2017). Model formirovaniya trebovanii k konfidentsialnosti, tselostnosti i dostupnosti dannykh v sisteme zashchity informatsii sredstv vychislitelnoi tekhniki i avtomatizirovannykh sistem [Model of Formation of Requirements to Confidentiality, Integrity and Availability of Data in the System of Information Protection of Computer Facilities and Automat-ed Systems], Regionalnaya informatika i informatsionnaya bezopasnost. Sbornik nauchnykh trudov [Regional Informatics and In-formation Security. Collection of Scientific Papers], St. Petersburg Society of Informatics, Computer Engineering, Communication and Control Systems, St. Petersburg, 2017, 122-126.
    7. V.A. Bogatyrev, S.V. Bogatyrev, Funktsionalnaya nadezhnost i ustoichivost vychislitelnogo protsessa [Functional Reliability and Stability of the Computational Process], Regionalnaya informatika i informatsionnaya bezopasnost. Sbornik nauchnykh trudov [Regional Informatics and Information Security. Collection of Scientific Papers], St. Petersburg Society of Informatics, Computer Engineering, Communication and Control Systems, St. Petersburg, 2017, 131-133.
    8. A.V. Flegontov, A. Chernykh, P. Klykov, The Evaluation of the Efficiency of Control Systems for Organizational Systems, 2015 International Conference on "Stability and Control Processes" in Memory of V.I. Zubov, Proceedings, 2015, 558-559. DOI: 10.1109 / SCP.2015.7342224.
    9. V.S. Artamonov, A.K. Chernykh, P.N. Klykov, Podkhod k otsenke effektivnosti sistem upravleniya organizatsionnymi sistemami, funktsioniruyushchimi v realnom masshtabe vremeni [Approach to the Evaluation of the Effectiveness of Management Systems of Organizational Systems Operating in Real Time], Problemy upravleniya riskami v tekhnosfere 4(32) (2014) 60-68.
    10. I.G. Malygin, A.Yu. Krylatov, A.P. Shirokolobova, Marshrutizatsiya dvizheniya pozharnykh avtomobilei v usloviyakh zagru-zhennoi transportnoi seti megapolisa [Routing of Firefighting Trucks in Heavy Traffic Environment of Megalopolises], Problemy upravleniya riskami v tekhnosfere 3(43) (2017) 87-95.
    11. A.N. Asaul, I.G. Malygin, V.I. Komashinskiy, The Project of the Intellectual Multimodal Transport System, Transportation Re-search Procedia, 12th International Conference "Organization and Traffic Safety Management in Large Cities", vol. 20, 2017, 25-30.
  • Downloads

  • How to Cite

    Klimentevich Chernykh, A., Arkadyevich Nefedyev, S., Nikolaevich Bardulin, E., Pavlovich Andreev, V., & Vladimirovna Stashevskaya, O. (2018). Management of Rectification of the Consequences of an Emergency Situation. International Journal of Engineering and Technology, 7(3.14), 276-282. https://doi.org/10.14419/ijet.v7i3.14.16906