should be developed to establish the necessary values
for the indicators of the appearance, identification,
neutralization of the problem and the qualification of
the manager.
4 CONCLUSIONS
The resulting management decision model allows us
to quantify the performance of the firewall and
information security in general. As a result, it is
necessary to control the control by setting the level of
the safety indicator and the frequency of failures, in
order to obtain the necessary values for the time of
identification and neutralization of the problem.
Based on the data obtained, the information security
plan can be adjusted in the future.
Without a doubt, a firewall is one of the main
security tools, but its presence alone cannot guarantee
complete security. Firewall settings should be tailored
to your needs, taking into account your threats, risks,
and IT infrastructure. You should also constantly
check the operation of the firewall and document all
actions so that the firewall protects you as effectively
as possible.
The developed model is based on the NSA and
LCIO, therefore, meet the requirement of adequacy
(Burlov, 2017.). On its basis, it is possible to develop
a technology for ensuring information security.
The information security model is based on the
system integration of three processes. Threat
formation. The process of recognizing the threat. The
process of eliminating the threat. The level of
information security is assessed by the probability
that each threat will be detected and eliminated. The
results of the simulation confirmed the main trends in
the process of ensuring information security. The new
concept of ensuring information security, in contrast
to the known ones, allows you to create conditions for
ensuring information security according to the
developed model. The use of LCIO allows the
decision-maker to form processes with predefined
properties. This reduces the level of risk when
achieving the goal of ensuring information security.
The proposed mathematical apparatus allows you
to build a mathematical model of a management
decision and on the basis of this link the three most
important processes in the organization of security.
Due to this mathematical model, security is ensured.
The use of a synthesis-based modelling approach
makes it possible to build such a system as a system
for managing the process of ensuring the safety of
work in the face of threats of emergency situations
based on the required level of the efficiency indicator.
Accordingly, a system built on such principles will be
devoid of the main drawback – the discrepancy
between the management results and expectations.
This approach allows you to evaluate any decision
made from the perspective of time and resource costs,
as well as to establish a clear, scientifically based
relationship between the decision made and the
results of the action.
ACKNOWLEDGEMENTS
The reported study was funded by Russian Ministry
of Science (information security), project № 08/2020.
REFERENCES
Abramov, V.M., Burlov, V.G. and Tatarnikova, T.M.
(2021). Digital Technologies Development for Geo-
Information Support of Techno-Sphere Security in
Arctic and Subarctic. IOP Conference Series: Earth
and Environmental Science, 666(5): 052076
Andreev, A.V., Burlov, V.G. and Grachev, M.I. (2019).
Information technologies and synthesis of the
management process model in the enterprise. 2019
International Science and Technology Conference
"EastConf", 8725428
Anokhin, P. K. (1979). System mechanisms of higher
nervous activity, M.: Science, p. 453.
Burlov V.G. and Popov N.N. (2017). Management of the
application of the space geoinformation system in the
interests of ensuring the environmental safety of the
region. Advances in the Astronautical Sciences, pages
751-760.
Burlov V.G., Abramov V.M., Istomin E.P., Fokicheva A.A.
and Sokolov A.G. (2018). The methodological basis for
the strategic management of territory development.
18th International Multidisciplinary Scientific
GeoConferences SGEM 2018. Conference
proceedings, pages 483-490.
Burlov, V. G. (2017). The law of preserving the integrity of
the object - the method of the basis for solving the
problems of information warfare and ensuring security.
Neurocomputers and their applications, pages 261-
263.
Burlov, V. G., Andreev, A. V. and Gomazov, F. A. (2018).
Safety management of a technosphere object based on
the law of preserving the integrity of the object. Federal
State Budgetary Educational Institution of Higher
Education "St. Petersburg State University of
Economics (SPbSEU)", pages 56-60.
Burlov, V. G., Andreev, A. V. and Gomazov, F. A. (2018).
Safety management of a technosphere object based on
the law of preserving the integrity of the object. Federal
State Budgetary Educational Institution of Higher
INFSEC 2021 - International Scientific and Practical Conference on Computer and Information Security