Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Object-oriented model of a formal description of an information and communication system

View through CrossRef
The purpose of the article is to study algorithms for the formal description of information and communication systems. The article discusses the main provisions on the formal representation of objects of information and communication systems. It is noted that the main environments of the information and communication system that are subject to a formal description are: physical environment, computing system environment, user environment, information environment. These components of the information and communication system are considered in detail, analyzed and documented in an informal form (in the form of text). There is a need for a mechanism for a unified description of a system that includes all environments. Such a description will be unambiguously formalized with well-defined mathematical concepts. The mechanism of a single formal description or the technique of a formal description will be unambiguous in understanding and serve as a control description when developing an information security policy in an information and communication system. An algorithm for the formal description of the information and communication system is proposed. In this algorithm, it is proposed to focus on the types and interaction of objects with each other. In such a scheme, attention is focused on such concepts as the object, the characteristics of the object, and the type of interaction with the object. Further consideration of the created block diagrams (graphs) is proposed to explore the possibilities of using this model to simulate cyber-attacks. Since each element contains fields that connect it to other elements, and each attack has an "entry point" using graph theory, it is possible to traverse the graph to determine the possible horizontal propagation paths of a cyber-attack.
Title: Object-oriented model of a formal description of an information and communication system
Description:
The purpose of the article is to study algorithms for the formal description of information and communication systems.
The article discusses the main provisions on the formal representation of objects of information and communication systems.
It is noted that the main environments of the information and communication system that are subject to a formal description are: physical environment, computing system environment, user environment, information environment.
These components of the information and communication system are considered in detail, analyzed and documented in an informal form (in the form of text).
There is a need for a mechanism for a unified description of a system that includes all environments.
Such a description will be unambiguously formalized with well-defined mathematical concepts.
The mechanism of a single formal description or the technique of a formal description will be unambiguous in understanding and serve as a control description when developing an information security policy in an information and communication system.
An algorithm for the formal description of the information and communication system is proposed.
In this algorithm, it is proposed to focus on the types and interaction of objects with each other.
In such a scheme, attention is focused on such concepts as the object, the characteristics of the object, and the type of interaction with the object.
Further consideration of the created block diagrams (graphs) is proposed to explore the possibilities of using this model to simulate cyber-attacks.
Since each element contains fields that connect it to other elements, and each attack has an "entry point" using graph theory, it is possible to traverse the graph to determine the possible horizontal propagation paths of a cyber-attack.

Related Results

Autonomy on Trial
Autonomy on Trial
Photo by CHUTTERSNAP on Unsplash Abstract This paper critically examines how US bioethics and health law conceptualize patient autonomy, contrasting the rights-based, individualist...
Object‐Oriented Analysis
Object‐Oriented Analysis
AbstractObject‐oriented analysis is a method of formulating a model of a desired software system in terms of objects and their interactions. The discipline was started by practitio...
Cidade educativa e movimentos culturais: um ensaio da educação não formal no ensino superior (p.221-239)
Cidade educativa e movimentos culturais: um ensaio da educação não formal no ensino superior (p.221-239)
Este artigo tem como propósito apontar maneiras de pensar e praticar a educação não formal em um curso de graduação em Pedagogia e colaborar para a formação do futuro profissional ...
EPD Electronic Pathogen Detection v1
EPD Electronic Pathogen Detection v1
Electronic pathogen detection (EPD) is a non - invasive, rapid, affordable, point- of- care test, for Covid 19 resulting from infection with SARS-CoV-2 virus. EPD scanning techno...
Communication Management
Communication Management
The question of what comprises communication management has caused numerous discussions among communication scholars representing different theoretical and disciplinary angles. Com...
Public engagement of scientists (Science Communication)
Public engagement of scientists (Science Communication)
Public engagement of scientists is defined as “all kinds of publicly accessible communication carried out by people presenting themselves as scientists. This includes scholarly com...
Depth-aware salient object segmentation
Depth-aware salient object segmentation
Object segmentation is an important task which is widely employed in many computer vision applications such as object detection, tracking, recognition, and ret...
Enhancing Non-Formal Learning Certificate Classification with Text Augmentation: A Comparison of Character, Token, and Semantic Approaches
Enhancing Non-Formal Learning Certificate Classification with Text Augmentation: A Comparison of Character, Token, and Semantic Approaches
Aim/Purpose: The purpose of this paper is to address the gap in the recognition of prior learning (RPL) by automating the classification of non-formal learning certificates using d...

Back to Top