CASPIAN JOURNAL

MANAGEMENT AND HIGH TECHNOLOGIES

Read Uchaev Dmitrij Yu, Brumshteyn Yurij M., Azhmukhamedov Iskandar M, Knyazeva Oksana M, Dyudikov Ivan A.  // Caspian journal : management and high technologies.  2016.  2.  pp. 82-97.

Uchaev Dmitrij Yu - post-graduate student, Astrakhan State Technical University, 16 Tatishchev St., Astrakhan, 414056, Russian Federation, uchaevdyu@icloud.com

Brumshteyn Yurij M. - Ph.D. (Engineering), Associate Professor, Astrakhan State University, 20а Tatishchev St., Astrakhan, 414056, Russian Federation, brum2003@mail.ru

Azhmukhamedov Iskandar M - D.Sc. (Engineering), associate professor, 16 Tatishchev St., Astrakhan, 414056, Russian Federation, aim_agtu@mail.ru

Knyazeva Oksana M - post-graduate student, Astrakhan state technical university, 16 Tatishchev St., Astrakhan, 414056, Russian Federation, chobitoksana@mail.ru

Dyudikov Ivan A. - post-graduate student, Astrakhan state university, 20а Tatishchev St., Astrakhan, 414056, Russian Federation, shtorman@mail.ru

In this paper are shown the relevance and importance of the information security (IS) issues analysis in processes of design and exploitation of automated control systems (ACS) for technological processes (TP), including for real-time (RT) control. Authors are analyzed in detail the purpose and particularities of ACS for TP in RT. In article proposed the original two-level classification of structure for IS risks, concerned with information provision of design and using of ACS for TP in RT. Also are reviewed the decisions, that can be applied to reduce the probability of realization (or eliminate) adverse events, associated with the design and exploitation of ACS for TP, including with RT control. Authors are analyzed the measures, that can provide a reduction (or full compensation) of losses from actually occurring adverse events, associated with violation of ACS for TP in RT. In article are considered in detail the thematic of «projects», which can be realized in order to reduce IS risks, concerned with the design, implementation and exploitation of ACS for TP.

Key words: , , , , , , , , , ,