@article{Holub_Soloviova_2019, title={RESEARCH OF INFORMATION PROTECTION METHODS IN COMPUTER SYSTEMS FOR MONITORING AND DIAGNOSTICS OF ELECTRIC SUPPLY OF RAILWAYS}, url={http://journal.eu-jr.eu/ttfpits/article/view/1028}, DOI={10.21303/2585-6847.2019.001028}, abstractNote={<div> <p>In modern conditions of growth of informatization, to ensure the reliability of the functioning of distributed computer information-diagnostic and control systems, which are mandatory for consideration, there are problems of assessing security and implementing protection of operational information.</p> <p>The state of information protection and the reliability of computer systems for corporate monitoring and diagnosis of the railway power supply system are analyzed. The main tasks in the intellectualization of component systems are defined, namely traction electric network. The principles of information protection are proposed, which include: active protection of information; convincing protection of information, consisting in the justification of the design and measures to protect the conditions and circumstances. Such a principle as the continuity of the information protection process provides for the organization of the protection of objects at all stages of the development and operation life cycle. A variety of information protection tools provides for the exclusion of patterns at the stage of selecting cover objects and various ways to implement protection, not excluding the use of standard solutions.</p> <p>The combination of the above principles in the work is called an integrated approach to information security, which is the basis for the creation of computer information protection systems. According to the sphere of information security, this approach complies with international ISO standards, and for the technical protection of information and state standards it complies with the requirements of existing national legislative and regulatory documents.</p> <p>To ensure the security of information stored and processed in computer systems, the coordinated application of various security measures is necessary.</p> </div&gt;}, journal={Technology transfer: fundamental principles and innovative technical solutions}, author={Holub, Halyna and Soloviova, Olena}, year={2019}, month={Nov.}, pages={9-11} }