{"id":1476,"date":"2021-01-16T17:23:50","date_gmt":"2021-01-16T15:23:50","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=1476"},"modified":"2021-04-14T14:45:13","modified_gmt":"2021-04-14T11:45:13","slug":"%d0%ba%d0%be%d0%bd%d1%86%d0%b5%d0%bf%d1%82%d1%83%d0%b0%d0%bb%d1%8c%d0%bd%d0%b0-%d0%bc%d0%be%d0%b4%d0%b5%d0%bb%d1%8c-%d1%81%d0%b8%d1%81%d1%82%d0%b5%d0%bc%d0%b8-%d0%b7%d0%b0%d1%85%d0%b8%d1%81%d1%82","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=1476","title":{"rendered":"\u041a\u043e\u043d\u0446\u0435\u043f\u0442\u0443\u0430\u043b\u044c\u043d\u0430 \u043c\u043e\u0434\u0435\u043b\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0432 \u0441\u0443\u0447\u0430\u0441\u043d\u0438\u0445 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445"},"content":{"rendered":"<p style=\"text-align: center;\">\u041a\u041e\u041d\u0426\u0415\u041f\u0422\u0423\u0410\u041b\u042c\u041d\u0410 \u041c\u041e\u0414\u0415\u041b\u042c \u0421\u0418\u0421\u0422\u0415\u041c\u0418 \u0417\u0410\u0425\u0418\u0421\u0422\u0423 \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0407 \u0412 \u0421\u0423\u0427\u0410\u0421\u041d\u0418\u0425 \u041a\u041e\u041c\u041f\u2019\u042e\u0422\u0415\u0420\u041d\u0418\u0425 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425<\/p>\n<p style=\"text-align: center;\">CONCEPTUAL MODEL OF THE SYSTEM OF INFORMATION PROTECTION IN MODERN COMPUTER SYSTEMS<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/28-6.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 164-167. \u041d\u043e\u043c\u0435\u0440: \u21163, 2019 (273)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0412.\u042e. \u0422\u0406\u0422\u041e\u0412\u0410, \u0421.\u041e. \u0421\u0410\u0412\u0427\u0423\u041a, \u0412.\u042e. \u0427\u0415\u0420\u041d\u0418\u0428<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nVERA YURIIVNA TITOVA, SERHII OLEHOVYCH SAVCHUK, VLADYSLAV YURIIOVYCH CHERNYSH<br \/>\nKhmelnytskyi National University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2019-273-3-164-167\">https:\/\/www.doi.org\/10.31891\/2307-5732-2019-273-3-164-167<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 26.05.2019 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 02.06.2019 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412\u00a0 \u0434\u0430\u043d\u0456\u0439 \u0441\u0442\u0430\u0442\u0442\u0456 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u043e \u0434\u0435\u0442\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u044e \u0437\u0430\u0434\u0430\u0447, \u044f\u043a\u0456 \u0432\u0438\u043d\u0438\u043a\u0430\u044e\u0442\u044c \u043f\u0456\u0434 \u0447\u0430\u0441 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0443 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0432\u0456\u0434 \u0434\u0456\u0457 \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f. \u041f\u0456\u0441\u043b\u044f \u0434\u0435\u0442\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0457 \u0437\u0430\u0434\u0430\u0447\u0456 \u0440\u043e\u0437\u043c\u0435\u0436\u043e\u0432\u0430\u043d\u043e \u043c\u0456\u0436 \u043f\u0456\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u0449\u043e \u0434\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u043e \u0441\u043f\u0440\u043e\u0435\u043a\u0442\u0443\u0432\u0430\u0442\u0438 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 \u0437\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043e\u0457 \u0441\u0438\u0441\u0442\u0435\u043c\u0438. \u0417\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u0430 \u0430\u0432\u0442\u043e\u0440\u0430\u043c\u0438 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430 \u0437\u0430 \u0440\u0430\u0445\u0443\u043d\u043e\u043a \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044f \u0443 \u043d\u0435\u0457 \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0456\u0432 \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u0454 \u043f\u0456\u0434\u0432\u0438\u0449\u0438\u0442\u0438 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0456\u0441\u0442\u044c \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0432 \u0441\u0443\u0447\u0430\u0441\u043d\u0438\u0445 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u0430\u0445.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u043a\u043e\u043d\u0446\u0435\u043f\u0442\u0443\u0430\u043b\u044c\u043d\u0430 \u043c\u043e\u0434\u0435\u043b\u044c, \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043d\u0430 \u0441\u0445\u0435\u043c\u0430, \u0437\u0430\u0445\u0438\u0441\u0442 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0456 \u0441\u0438\u0441\u0442\u0435\u043c\u0438.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The details of tasks that arise during the protection of information in computer systems from the action of malicious software are analysed in this article. Detailing tasks are delimited between the subsystems of the information protection system, which allowed designing the structure of this system. The system of computer information protection consists of the following components: the dialog subsystem, the monitoring subsystem, the planning of inspections subsystem, the update subsystem. The proposed structure doesn\u2019t contradict to the &#8220;Concept of information security protection in computer systems&#8221; adopted to date and takes into account the measures taken to automate the protection of information in modern computer systems. It also can improve the effectiveness of information security in modern computers by introducing its intellectual components.<br \/>\n<strong>Keywords:<\/strong> conceptual model, structure diagram, information protection, computer systems.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Pro derzhavnu taiemnytsiu [Elektron. resurs] : zakon Ukrainy \/\/ Vidomosti Verkhovnoi Rady (VVR). \u2013 1994. \u2013 \u2116 16, st. 93. \u2013 Rezhym dostupu : http:\/\/zakon2.rada.gov.ua\/laws\/show\/3855-12<\/li>\n<li>Pro Natsionalnu systemu konfidentsiinoho zviazku [Elektron. resurs] : zakon Ukrainy, zi zminamy. \u2013 Rezhym dostupu : http:\/\/zakon2.rada.gov.ua\/laws\/show\/2919-14<\/li>\n<li>Rodichev Yu.A. Normativnaya baza i standarty v oblasti informacionnoj bezopasnosti: standart tretego pokoleniya \/ Yu.A. Rodichev. \u2013 SPb : Piter, 2018. \u2013 254 s. \u2013 ISBN: 978-5-4461-0861-9<\/li>\n<li>Baranova E.K. Informacionnaya bezopasnost i zashita informacii : ucheb. posobie \/ E.K. Baranova, A.V. Babash. \u2013 M. : RIOR: INFRA-M, 2017. \u2013 322 s. \u2013 ISBN: 978-5-369-01450-9<\/li>\n<li>Nesterov S.A. Osnovy informacionnoj bezopasnosti \/ S.A. Nesterov. \u2013 M. : Izd. \u00abLan\u00bb, 2016. \u2013 324 s. \u2013 ISBN: 978-5-8114-2290-6<\/li>\n<li>Biryukov A.A. Informacionnaya bezopasnost. Zashita i napadenie \/ A.A. Biryukov. \u2013 M. : DMK-Press, 2017. \u2013 434 s. \u2013 ISBN: 978-5-97060-435-9<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u041a\u041e\u041d\u0426\u0415\u041f\u0422\u0423\u0410\u041b\u042c\u041d\u0410 \u041c\u041e\u0414\u0415\u041b\u042c \u0421\u0418\u0421\u0422\u0415\u041c\u0418 \u0417\u0410\u0425\u0418\u0421\u0422\u0423 \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0407 \u0412 \u0421\u0423\u0427\u0410\u0421\u041d\u0418\u0425 \u041a\u041e\u041c\u041f\u2019\u042e\u0422\u0415\u0420\u041d\u0418\u0425 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425 CONCEPTUAL MODEL OF THE SYSTEM OF INFORMATION PROTECTION IN MODERN COMPUTER SYSTEMS \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 164-167. \u041d\u043e\u043c\u0435\u0440: \u21163, 2019 (273) \u0410\u0432\u0442\u043e\u0440\u0438: \u0412.\u042e. \u0422\u0406\u0422\u041e\u0412\u0410, \u0421.\u041e. \u0421\u0410\u0412\u0427\u0423\u041a, \u0412.\u042e. \u0427\u0415\u0420\u041d\u0418\u0428 \u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 VERA YURIIVNA TITOVA, SERHII OLEHOVYCH SAVCHUK, VLADYSLAV YURIIOVYCH CHERNYSH Khmelnytskyi National University DOI: https:\/\/www.doi.org\/10.31891\/2307-5732-2019-273-3-164-167 \u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review : 26.05.2019 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[20],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1476"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1476"}],"version-history":[{"count":5,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1476\/revisions"}],"predecessor-version":[{"id":5784,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1476\/revisions\/5784"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}