Abstract
Educational institutions are increasingly faced with the fact that there are problems of violations of the protection parameters of information and software, they are determined by the influence of unauthorized actions of legal users – employees of the institution. The need for comprehensive protection of information and software resources determines the development of an integrated system that is integrated into the main information environment of educational institutions, its main focus is related to the prevention of the maximum number of types of "insider" attacks. The purpose of the work is related to the development of a methodology that allows for automated management of multi-level access to information and program resources of educational organizations to increase the level of protection. The main tasks to be solved in the work: analysis of the characteristics of information processing in the system, development of a technique that allows for the design of an automated system aimed at distinguishing access to information and software, the development of a software module that allows you to manage the database of an automated system of an educational company to ensure Areas of access to strategically important information are given. The algorithm of work of the administrator of educational institution with system is presented. The scheme of tables of the database of the institution is presented. Viewing the table of incidents of violation of the rules of work with information and software of the system is available only to employees of the Department of information security of educational institution and only in the reading mode. Changing the data of the table is not available to the staff of the institution or the system itself. The system produces only "additional records" of new table tuples. When logging in, the employee must enter the appropriate identifier and authenticator (in the example provided, the authenticator is the password). The interrelations between the structural units of the educational institution for the subsequent analysis of information flows are revealed. On the basis of the identified relationships, a structural model of automated information flow management based on the principles of information and software protection of the system is developed.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright (c) 2018 International Journal of Information Technology Applications
