Popis: |
[For the English abstract and full text of the article please see the attached PDF-File (English version follows Russian version)].ABSTRACT The article considers issues related to the construction of monitoring systems that provide detection of threats in the information environment. In particular, the recognition method for implementing models of analyzers in the zone of a given space of trusted and possible untrusted information traffic routes. Keywords: information security, isolated software environment, hidden channels, monitoring of subjects. |