Management of Rectification of the Consequences of an Emergency Situation

  • Authors

    • Andrey Klimentevich Chernykh
    • Sergey Arkadyevich Nefedyev
    • Evgenij Nikolaevich Bardulin
    • Vladislav Pavlovich Andreev
    • Olga Vladimirovna Stashevskaya
    2018-07-25
    https://doi.org/10.14419/ijet.v7i3.14.16906
  • emergency situation, decision for emergency response, information systems, information threats, unauthorized access, information protection, malicious programs.
  • The purpose of the paper is to develop an information technology used to implement operational and quality management of rectification of the consequences of an emergency situation. Typical examples are given of malicious programs and the ways of their impact on the work of computers used to develop solutions for the elimination of the consequences of an emergency situation. To prevent unauthorized access to computers and their infection with malicious programs, preventive measures are recommended. The novelty of the paper is the development of an information technology to recover the encrypted or blocked by malicious programs data necessary to develop solutions for the elimination of the consequences of an emergency situation and the concept of building a fragment of an information system within which this information technology should be implemented. The authors consider an approach to the improvement of the information system for officials of the management bodies of the Ministry of Emergency Situations of Russia, developing a solution for the relief of the consequences of an emergency situation, which provides the protection of their personal computers from malicious programs.

     

     
  • References

    1. [1] Ivanov, D. Emm, F. Sinitsyn, S. Pontiroli. Kaspersky Security Bulletin 2016. Syuzhet goda. Programmy-vymogateli: revolyutsiya [Kaspersky Security Bulletin 2016. The Plot of the Year. Extortion Programs: Revolution]. https://securelist.ru/analysis/ksb/29788/kaspersky-security-bulletin-2016-story-of-the-year/. Revised December 21, 2016. Accessed June 27, 2018.

      [2] M. Sconzo, R. Valdez. Advanced Threat Protection, Detection and Response, Endpoint and Server Security, Prevention, Ransomware, Response, Tech Toolbox. Carbon Black. https://www.carbonblack.com/2016/03/25/threat-alert-powerware-new-ransomware-written-in-powershell-targets-organizations-via-microsoft-word/. Revised March 25, 2016. Accessed June 27, 2018.

      [3] N.N. Moshak, K.V. Evseiko, A.V. Logintsev, Problemy zashchity informatsionno-telekommunikatsionnoi infrastruktury RF ot kiberatak [Problems of Protection of the Information and Telecommunications Infrastructure of the Russian Federation from Cyberattacks], Regionalnaya informatika i informatsionnaya bezopasnost. Sbornik nauchnykh trudov [Regional Informatics and Information Security. Collection of Scientific Papers], St. Petersburg Society of Informatics, Computer Engineering, Communication and Control Systems, St. Petersburg, 2017, 31-36.

      [4] O.Yu. Piyukov, I.V. Gvozdkov, Obespechenie bezopasnosti informatsionnykh resursov obrazovatelnykh uchrezhdenii [Ensuring the Security of Information Resources of Educational Institutions], Regionalnaya informatika i informatsionnaya bezopasnost. Sbornik nauchnykh trudov [Regional Informatics and Information Security. Collection of Scientific Papers], St. Petersburg Society of Informatics, Computer Engineering, Communication and Control Systems, St. Petersburg, 2017, 44-46.

      [5] A.V. Shipilova, Modelirovanie uyazvimostei v sisteme bezopasnosti [Modeling of Vulnerabilities in the Security System], Regionalnaya informatika i informatsionnaya bezopasnost. Sbornik nauchnykh trudov [Regional Informatics and Information Security. Collection of Scientific Papers], St. Petersburg Society of Informatics, Computer Engineering, Communication and Control Systems, St. Petersburg, 2017, 74-77.

      [6] V.I. Kuvatov, A.I. Primakin, (2017). Model formirovaniya trebovanii k konfidentsialnosti, tselostnosti i dostupnosti dannykh v sisteme zashchity informatsii sredstv vychislitelnoi tekhniki i avtomatizirovannykh sistem [Model of Formation of Requirements to Confidentiality, Integrity and Availability of Data in the System of Information Protection of Computer Facilities and Automated Systems], Regionalnaya informatika i informatsionnaya bezopasnost. Sbornik nauchnykh trudov [Regional Informatics and Information Security. Collection of Scientific Papers], St. Petersburg Society of Informatics, Computer Engineering, Communication and Control Systems, St. Petersburg, 2017, 122-126.

      [7] V.A. Bogatyrev, S.V. Bogatyrev, Funktsionalnaya nadezhnost i ustoichivost vychislitelnogo protsessa [Functional Reliability and Stability of the Computational Process], Regionalnaya informatika i informatsionnaya bezopasnost. Sbornik nauchnykh trudov [Regional Informatics and Information Security. Collection of Scientific Papers], St. Petersburg Society of Informatics, Computer Engineering, Communication and Control Systems, St. Petersburg, 2017, 131-133.

      [8] A.V. Flegontov, A. Chernykh, P. Klykov, The Evaluation of the Efficiency of Control Systems for Organizational Systems, 2015 International Conference on "Stability and Control Processes" in Memory of V.I. Zubov, Proceedings, 2015, 558-559. DOI: 10.1109 / SCP.2015.7342224.

      [9] V.S. Artamonov, A.K. Chernykh, P.N. Klykov, Podkhod k otsenke effektivnosti sistem upravleniya organizatsionnymi sistemami, funktsioniruyushchimi v realnom masshtabe vremeni [Approach to the Evaluation of the Effectiveness of Management Systems of Organizational Systems Operating in Real Time], Problemy upravleniya riskami v tekhnosfere 4(32) (2014) 60-68.

      [10] I.G. Malygin, A.Yu. Krylatov, A.P. Shirokolobova, Marshrutizatsiya dvizheniya pozharnykh avtomobilei v usloviyakh zagruzhennoi transportnoi seti megapolisa [Routing of Firefighting Trucks in Heavy Traffic Environment of Megalopolises], Problemy upravleniya riskami v tekhnosfere 3(43) (2017) 87-95.

      [11] A.N. Asaul, I.G. Malygin, V.I. Komashinskiy, The Project of the Intellectual Multimodal Transport System, Transportation Research Procedia, 12th International Conference "Organization and Traffic Safety Management in Large Cities", vol. 20, 2017, 25-30.

      [1] Doktrina informatsionnoi bezopasnosti Rossiiskoi Federatsii [The Doctrine of Information Security of the Russian Federation]. Approved by the Decree of the President of the Russian Federation No. 646.

      [2] Kod bezopasnosti. SZI ot NSD Secret Net [Security Code. Means of Protecting Information from Unauthorized Access by Secret Net]. http://www.securitycode.ru/products/secret_net/. Accessed June 27, 2018.

      [3] SZI ot NSD Dallas Lock. Dallas Lock 8.0-K [Dallas Lock − Means of Protecting Information from Unauthorized Access. Dallas Lock 8.0-K]. https://www.dallaslock.ru/products/szi-nsd-dallas-lock/. Accessed June 27, 2018.

      [4] A.V. Barabanov, A.S. Markov, V.L. Tsirlov, Metodicheskii apparat otsenki sootvetstviya avtomatizirovannykh sistem trebovaniyam bezopasnosti informatsii [Methodological Apparatus for Assessing the Compliance of Automated Systems with Information Security Requirement], Spetstekhnika i svyaz 3 (2011).

      [5] M.P. Chaplygina, Metodika kontrolya zashchishchennosti avtomatizirovannoi sistemy obrabotki konfidentsialnoi informatsii ot nesanktsionirovannogo dostupa k informatsii [The Methods for Controlling Security of an Automated System for Processing Confidential Information from Unauthorized Access to Information], Molodoi uchenyi 4 (2016) 166-169. https://moluch.ru/archive/108/26137/. Accessed June 27,2018.

      [6] K.E. Klimentyev, Kompyuternye virusy i antivirusy. Vzglyad programmista [Computer Viruses and Antiviruses. The View of the Programmer], DMK Press, St. Petersburg, 2013.

      [7] V.F. Shangin, Informatsionnaya bezopasnost i zashchita informatsii [Information Security and Information Protection]. DMK, Moscow, 2014.

      [8] V.G. Anisimov, A.A. Selivanov, E.G. Anisimov, Metodika otsenki effektivnosti zashchity informatsii v sisteme mezhvedomstvennogo informatsionnogo vzaimodeistviya pri upravlenii oboronoi gosudarstva [Method of Assessing the Effectiveness of Information Protection in the System of Inter-Agency Information Interaction in the Management of the State Defense], Informatsiya i kosmos 4 (2016) 76-80.

      [9] V.V. Balyasnikov, Yu.V. Vedernikov, Model prichinnogo analiza na osnove ispolzovaniya dannykh ob osobykh situatsiyakh [Model of Causal Analysis Based on the Use of Data on Special Situations], Voprosy oboronnoi tekhniki, Seriya 16: Tekhnicheskie sredstva protivodeistviya terrorizmu 1-2 (2015) 31-38.

      [10] V.G. Anisimov, E.G. Anisimov, Risk-orientirovannyi podkhod k organizatsii kontrolya v podsistemakh obespecheniya bezopasnosti informatsionnykh sistem [Risk-Oriented Approach to the Organization of Control in the Subsystems to Ensure the Security of Information Systems], Problemy informatsionnoi bezopasnosti, Kompyuternye sistemy 3 (2016) 61-67.

  • Downloads

  • How to Cite

    Klimentevich Chernykh, A., Arkadyevich Nefedyev, S., Nikolaevich Bardulin, E., Pavlovich Andreev, V., & Vladimirovna Stashevskaya, O. (2018). Management of Rectification of the Consequences of an Emergency Situation. International Journal of Engineering & Technology, 7(3.14), 276-282. https://doi.org/10.14419/ijet.v7i3.14.16906