Header
DonNTU Biography Library Links Autosynopsis Ind. Task FCIS Masters
Русская версия

Informational Safety In The Studying Systems

Master Yulia Zanyala

Autosynopsis

1. The prologue
1.1 Introduction (urgency and motivation)

The subject of my master’s work is protection of the information in training systems. Computer training systems now are rather actual products, because they give an opportunity to be trained:

Training systems can be:

Both kinds of systems have the specificity by way of protection of the information.

As complex training systems include systems of testing of knowledge the basic problem here consists in protection of test tasks and answers to them against attempts of the non-authorized access.

If the question is remote system, so here protection is required for network connection between client and server components of system.

Encryption, or cryptography, can help with both cases. For the first case it is protected-key, for the second it is public-key.

The motivation in a choice of a subject has been caused by actuality of the information safety questions in the world. I am interested in mathematics, so from all ways of protection of the information I am most imposed by cryptography.

1.2 The purposes and tasks of job

The functional sites of training system should become result of job, one of them will contain a database with tests and answers to them, another will provide connection between a client and server part of system. Both parts should be protected in appropriate way. The modern, partly advanced algorithms are used for protection. The plan of protection of a database is submitted below in animated paint.

Схема защиты базы данных
1.3 Prospective scientific novelty and practical value

Practical value of the given development consists in an opportunity of application of the improved algorithms for the decision of practical tasks. Such tasks arise in the diverse fields of activity. Besides training systems it is any systems of the financial account, especially bank, sphere of protection of copyrights to software products, and generally any systems at which there is an element of confidentiality.

Scientific novelty consists in improvement of already available development.

2. The basic part
2.1 The local review

Many masters of the last and current years were engaged in a problem of protection of the information in DonNTU. It is possible to see their jobs under links №8-12 in the catalogue of links. Next works are close to considered subject and especially interesting: "Protection of the information in development of training systems" (2006) by Elena Cherepkova and “Research of means of a safety of computer networks " (2002)by Andrey Volkogon.

Besides it Alexandr Y. Ivanov. is engaged in the given question on faculty FCIS.

The question about training systems is also developed in master's works( links №1-7).

In general the subject of my research is within the framework of one of the basic directions of researches of faculty CS: a computerization of technological processes and systems.

2.2 The national review

Now in Ukraine and the countries of CIS (in particular, in Russia) there is an active development, both on questions of training systems, and on questions of protection of the information (see links).

Development of area of protection of the information in the majority of the countries is adjusted by the legislation. Russia and Ukraine are not the exeption[5,6]. Frequently legislative restrictions interfere with development of this area by efforts of civil scientists, leaving the initiative to militaries. In the considered countries the problem of the state monopoly for cryptological researches is discussed not so briskly as abroad, however, such problem exists.

2.3 The global review

In a course of search of material on the given question among global sources the attention was turned to the following organizations:

3. Final part
3.1 The description planned and received on a subject

Now the following jobs are carried out:

3.2 Conclusions

At the given stage the basic achievements are: a choice of a direction of conducting development, a choice of the basic object of researches and improvements, and as some operating time concerning improvement of qualities of algorithm.

3.3 The literature
  1. Саломаа А. Криптография с открытым ключом// М.:Мир, 1995. – 318с.
  2. Андрей Винокуров Алгоритм шифрования ГОСТ 28147-89, его использование и реализация для компьютеров платформы Intel x86.// http://kiev-security.org.ua/b/102.shml
  3. Лукацкий А.В. АНАЛИЗ ЗАЩИЩЕННОСТИ БАЗ ДАННЫХ // http://bezpeka.com/ru/search/result.php?id=7543
  4. Ростовцев А. Г., Маховенко Е. Б. ДВА ПОДХОДА К АНАЛИЗУ БЛОЧНЫХ ШИФРОВ // Проблемы информационной безопасности. Компьютерные системы. СПб., 2002, № 1.
  5. Лазарева Н. Российская криптография в путах законов // CRN.ИТ-бизнес №4 (177), 27 марта 2003 года http://www.crn.ru/numbers/reg-numbers/detail.php?ID=8454
  6. Белов С., Мартыненко С. Есть ли жизнь на Марсе…(в смысле - в электронном документе Украины)? // http://gipi.internews.ua/ukr/activity/e-sign/ecp_banks1.rtf
Up Up