A simulation model for identifying information security threats from low-frequency acoustoelectric transformations

Aim. The article considers the physical basis for the formation of a technical channel of information leakage due to low-frequency acoustoelectric transformations. Methods. The research was based on simulation modelling methods. The method of instrumental and computational control of the security of...

Full description

Saved in:
Bibliographic Details
Main Authors: D. A. Korochentsev, L. V. Cherkesova, K. A. Namavir
Format: Article
Language:Russian
Published: Dagestan State Technical University 2020-08-01
Series:Вестник Дагестанского государственного технического университета: Технические науки
Subjects:
Online Access:https://vestnik.dgtu.ru/jour/article/view/809
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1839576215832231936
author D. A. Korochentsev
L. V. Cherkesova
K. A. Namavir
author_facet D. A. Korochentsev
L. V. Cherkesova
K. A. Namavir
author_sort D. A. Korochentsev
collection DOAJ
description Aim. The article considers the physical basis for the formation of a technical channel of information leakage due to low-frequency acoustoelectric transformations. Methods. The research was based on simulation modelling methods. The method of instrumental and computational control of the security of speech information in the considered channel of information leakage was applied. Results. Based on the developed simulation model, using the Model-View-Presenter design pattern, a software tool was developed. The main software classes implementing this model are presented. The functionality of the developed software tool is demonstrated and recommendations are given on the possible application of the developed simulation model for identifying threats to information security due to low-frequency acoustoelectric transformations. Conclusion. The developed simulation model can be used by security specialists at both large and small enterprises, which implement measures for ensuring information protection. The model creates conditions for its active implementation in the educational process of training specialists in the field of information security, using both traditional (contact work) and distance learning formats.
format Article
id doaj-art-f7021b1ed2a94e08a39ed10d6d3aa5fc
institution Matheson Library
issn 2073-6185
2542-095X
language Russian
publishDate 2020-08-01
publisher Dagestan State Technical University
record_format Article
series Вестник Дагестанского государственного технического университета: Технические науки
spelling doaj-art-f7021b1ed2a94e08a39ed10d6d3aa5fc2025-08-04T13:03:20ZrusDagestan State Technical UniversityВестник Дагестанского государственного технического университета: Технические науки2073-61852542-095X2020-08-01472657410.21822/2073-6185-2020-47-2-65-74580A simulation model for identifying information security threats from low-frequency acoustoelectric transformationsD. A. Korochentsev0L. V. Cherkesova1K. A. Namavir2Don State Technical UniversityDon State Technical UniversityDon State Technical UniversityAim. The article considers the physical basis for the formation of a technical channel of information leakage due to low-frequency acoustoelectric transformations. Methods. The research was based on simulation modelling methods. The method of instrumental and computational control of the security of speech information in the considered channel of information leakage was applied. Results. Based on the developed simulation model, using the Model-View-Presenter design pattern, a software tool was developed. The main software classes implementing this model are presented. The functionality of the developed software tool is demonstrated and recommendations are given on the possible application of the developed simulation model for identifying threats to information security due to low-frequency acoustoelectric transformations. Conclusion. The developed simulation model can be used by security specialists at both large and small enterprises, which implement measures for ensuring information protection. The model creates conditions for its active implementation in the educational process of training specialists in the field of information security, using both traditional (contact work) and distance learning formats.https://vestnik.dgtu.ru/jour/article/view/809computerization objectacoustoelectric channels of information leakageinformation protectionthreat to information securitysimulation modelinformation security
spellingShingle D. A. Korochentsev
L. V. Cherkesova
K. A. Namavir
A simulation model for identifying information security threats from low-frequency acoustoelectric transformations
Вестник Дагестанского государственного технического университета: Технические науки
computerization object
acoustoelectric channels of information leakage
information protection
threat to information security
simulation model
information security
title A simulation model for identifying information security threats from low-frequency acoustoelectric transformations
title_full A simulation model for identifying information security threats from low-frequency acoustoelectric transformations
title_fullStr A simulation model for identifying information security threats from low-frequency acoustoelectric transformations
title_full_unstemmed A simulation model for identifying information security threats from low-frequency acoustoelectric transformations
title_short A simulation model for identifying information security threats from low-frequency acoustoelectric transformations
title_sort simulation model for identifying information security threats from low frequency acoustoelectric transformations
topic computerization object
acoustoelectric channels of information leakage
information protection
threat to information security
simulation model
information security
url https://vestnik.dgtu.ru/jour/article/view/809
work_keys_str_mv AT dakorochentsev asimulationmodelforidentifyinginformationsecuritythreatsfromlowfrequencyacoustoelectrictransformations
AT lvcherkesova asimulationmodelforidentifyinginformationsecuritythreatsfromlowfrequencyacoustoelectrictransformations
AT kanamavir asimulationmodelforidentifyinginformationsecuritythreatsfromlowfrequencyacoustoelectrictransformations
AT dakorochentsev simulationmodelforidentifyinginformationsecuritythreatsfromlowfrequencyacoustoelectrictransformations
AT lvcherkesova simulationmodelforidentifyinginformationsecuritythreatsfromlowfrequencyacoustoelectrictransformations
AT kanamavir simulationmodelforidentifyinginformationsecuritythreatsfromlowfrequencyacoustoelectrictransformations