{"id":1113,"date":"2021-01-15T21:42:24","date_gmt":"2021-01-15T19:42:24","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=1113"},"modified":"2021-03-23T12:06:55","modified_gmt":"2021-03-23T10:06:55","slug":"%d1%96%d0%bd%d1%84%d0%be%d1%80%d0%bc%d0%b0%d1%86%d1%96%d0%b9%d0%bd%d0%be-%d0%b0%d0%bd%d0%b0%d0%bb%d1%96%d1%82%d0%b8%d1%87%d0%bd%d1%96-%d1%86%d0%b5%d0%bd%d1%82%d1%80%d0%b8-%d0%b2-%d1%83%d0%bf%d1%80","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=1113","title":{"rendered":"\u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u0430\u043d\u0430\u043b\u0456\u0442\u0438\u0447\u043d\u0456 \u0446\u0435\u043d\u0442\u0440\u0438 \u0432 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u0456 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u044e \u0431\u0435\u0437\u043f\u0435\u043a\u043e\u044e \u0434\u0435\u0440\u0436\u0430\u0432\u0438"},"content":{"rendered":"<p style=\"text-align: center;\">\u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0419\u041d\u041e-\u0410\u041d\u0410\u041b\u0406\u0422\u0418\u0427\u041d\u0406 \u0426\u0415\u041d\u0422\u0420\u0418 \u0412 \u0423\u041f\u0420\u0410\u0412\u041b\u0406\u041d\u041d\u0406 \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0419\u041d\u041e\u042e \u0411\u0415\u0417\u041f\u0415\u041a\u041e\u042e \u0414\u0415\u0420\u0416\u0410\u0412\u0418<\/p>\n<p style=\"text-align: center;\">INFORMATION-ANALYTICAL CENTERS OF THE STATE INFORMATION SECURITY MANAGEMENT<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/19-3.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 105-109. \u041d\u043e\u043c\u0435\u0440: \u21161, 2020 (281)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0410. \u0412. \u0414\u0423\u0414\u0410\u0422\u042c\u0404\u0412, \u041e. \u041f. \u0412\u041e\u0419\u0422\u041e\u0412\u0418\u0427, \u0412. \u0412. \u041c\u0418\u0420\u041e\u041d\u042e\u041a<br \/>\n\u0412\u0456\u043d\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nA.V. DUDATYEV, O. P. VOITOVYCH, V. V. MIRONYUK<br \/>\nVinnytsia National Technical University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2020-281-1-105-109\">https:\/\/www.doi.org\/10.31891\/2307-5732-2020-281-1-105-109<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 24. 01.2020 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 14.02.2020 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0417\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u043e \u043c\u043e\u0434\u0435\u043b\u044c \u00ab\u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0433\u043e \u043f\u043e\u0440\u0442\u0440\u0435\u0442\u0443\u00bb \u043e\u0431\u2019\u0454\u043a\u0442\u0430 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0432\u0456\u0434 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0434\u043e \u0434\u0435\u0440\u0436\u0430\u0432\u0438. \u041d\u0430\u0432\u0435\u0434\u0435\u043d\u0430 \u0441\u0445\u0435\u043c\u0430 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u0430\u043d\u0430\u043b\u0456\u0442\u0438\u0447\u043d\u043e\u0433\u043e \u0446\u0435\u043d\u0442\u0440\u0443. \u041d\u0430 \u0431\u0430\u0437\u0456 \u043e\u0442\u0440\u0438\u043c\u0430\u043d\u0438\u0445 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0456\u0432 \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u0430 \u043c\u0435\u0442\u043e\u0434\u043e\u043b\u043e\u0433\u0456\u044f \u043f\u043e\u0431\u0443\u0434\u043e\u0432\u0438 \u0442\u0440\u044c\u043e\u0445\u0440\u0456\u0432\u043d\u0435\u0432\u043e\u0457 \u043f\u043e\u043b\u0456\u0442\u0438\u043a\u0438 \u0431\u0435\u0437\u043f\u0435\u043a\u0438, \u0441\u043f\u0440\u044f\u043c\u043e\u0432\u0430\u043d\u043e\u0457 \u043d\u0430 \u0434\u0435\u0440\u0436\u0430\u0432\u0443, \u0440\u0435\u0433\u0456\u043e\u043d \u0442\u0430 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0438\u0439 \u043e\u0431\u2019\u0454\u043a\u0442.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430: <\/strong>\u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u0430\u043d\u0430\u043b\u0456\u0442\u0438\u0447\u043d\u0438\u0439 \u0446\u0435\u043d\u0442\u0440, \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0439 \u043f\u043e\u0440\u0442\u0440\u0435\u0442 \u043e\u0431\u2019\u0454\u043a\u0442\u0430 \u0437\u0430\u0445\u0438\u0441\u0442\u0443, \u043f\u043e\u043b\u0456\u0442\u0438\u043a\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0438, \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430 \u0434\u0435\u0440\u0436\u0430\u0432\u0438.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The methodological basis of the informational-analytic center creation for the state information security management is proposed. The analysis of the existing results upside of the informational-analytic center designing and information support definition in the state management system is carried out. The approach on practical realization of two main tasks, namely assessment and assurance of the information security certain level is proposed. Such approach allows to effectively implement the process of information security management, that is, to implement appropriate situational models, algorithms, rules, etc. Information-analytical work is impossible without effective information support. The analysis shows that the information security management of the state is a multilevel process. Today there is no single understanding of this process, however. The reason is the lack of a consistent methodology of the state information security management system. The methodology that enables effective information-analytical research to provide information support is solving the following tasks: the problem of forecasting and timely detection of information security threats, creating conditions for likelihood minimizing of threats implementation, creating conditions and mechanisms for responding to new threats, countermeasures organization of information-cybernetic and information-psychological operations, countermeasures effectiveness assessment carrying out. The approach to the construction of methodological bases for the information-analytical centers (services) creation in the system of the state information security management is proposed, namely: the model of information profile of the protected object, which allows to formalize the task by the \u201cobject &#8211; group of objects (region) \u2013 state\u201d level; the structural model of the information-analytical center, which includes models of the protected object profile; the method of providing comprehensive information security at the \u201cobject &#8211; object group (region) \u2013 state\u201d level using the proposed models and structures.<br \/>\n<strong>Keywords: <\/strong>informational-analytic center, protected object information profile, security policy, state information security.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Sarychev Yu. O. Teoretychnyi pidkhid do informatsiinoho zabezpechennia v systemi derzhavnoho upravlinnia u voiennii sferi \/ Yu. O. Sarychev \/\/ Visnyk NADU pry Prezydenti Ukrainy. Seriia \u201cDerzhavne Upravlinnia\u201d. \u2013 2016. \u2013 \u2116 4. \u2013 S. 153\u2013160.<\/li>\n<li>Dudatiev A. V. Modeli informatsiinoi pidtrymky upravlinnia kompleksnoiu informatsiinoiu bezpekoiu \/ A. V. Dudatiev, O. P. Voitovych \/\/ Radioelektronika, informatyka, upravlinnia. \u2013 2017. \u2013 \u2116 1. \u2013 S. 107\u2013114.<\/li>\n<li>Dudatev A. V. Metod otsiniuvannia bezpeky informatsiinykh resursiv pidpryiemstva na osnovi analizu vrazlyvostei \/ A. V. Dudatiev, Yu. V. Baryshev \/\/ Herald of Khmelnytskyi National University. \u2013 2008. \u2013 \u2116 4. \u2013 S. 78\u201383.<\/li>\n<li>Kolesnyk I. S. Otsinka vplyvu vytoku informatsii na stan pidpryiemstva \/ I. S. Kolesnyk, A. V. Dudatiev, O. P. Voitovych \/\/ Systemy obrobky informatsii. \u2013 2010. \u2013 \u2116 5. \u2013 S. 224\u2013229.<\/li>\n<li>Dudatiev A. V. Rozrobka unifikovanykh modelei systemnoho proektuvannia optymalnykh system zakhystu informatsiinykh resursiv \/ A .V. Dudatiev \/\/ Visnyk Cherkaskoho tekhnolohichnoho universytetu. \u2013 2008. \u2013 \u2116 1. \u2013 S. 3\u20138.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>\u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0419\u041d\u041e-\u0410\u041d\u0410\u041b\u0406\u0422\u0418\u0427\u041d\u0406 \u0426\u0415\u041d\u0422\u0420\u0418 \u0412 \u0423\u041f\u0420\u0410\u0412\u041b\u0406\u041d\u041d\u0406 \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0419\u041d\u041e\u042e \u0411\u0415\u0417\u041f\u0415\u041a\u041e\u042e \u0414\u0415\u0420\u0416\u0410\u0412\u0418 INFORMATION-ANALYTICAL CENTERS OF THE STATE INFORMATION SECURITY MANAGEMENT \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 105-109. \u041d\u043e\u043c\u0435\u0440: \u21161, 2020 (281) \u0410\u0432\u0442\u043e\u0440\u0438: \u0410. \u0412. \u0414\u0423\u0414\u0410\u0422\u042c\u0404\u0412, \u041e. \u041f. \u0412\u041e\u0419\u0422\u041e\u0412\u0418\u0427, \u0412. \u0412. \u041c\u0418\u0420\u041e\u041d\u042e\u041a \u0412\u0456\u043d\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 A.V. DUDATYEV, O. P. VOITOVYCH, V. V. MIRONYUK Vinnytsia National Technical University DOI: https:\/\/www.doi.org\/10.31891\/2307-5732-2020-281-1-105-109 \u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review : 24. 01.2020 \u0440. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[13],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1113"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1113"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1113\/revisions"}],"predecessor-version":[{"id":5100,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1113\/revisions\/5100"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}