Научная статья на тему 'Building models for creating and evaluating the effectiveness of systems that provide security when working with information and measurement systems'

Building models for creating and evaluating the effectiveness of systems that provide security when working with information and measurement systems Текст научной статьи по специальности «Компьютерные и информационные науки»

CC BY
283
89
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
INFORMATION AND MEASURING SYSTEMS / SECURITY / ENERGY ACCOUNTIN / AUTOMATION / MODELING / ИНФОРМАЦИОННО-ИЗМЕРИТЕЛЬНЫЕ СИСТЕМЫ / БЕЗОПАСНОСТЬ / УЧЕТ ЭНЕРГОРЕСУРСОВ / АВТОМАТИЗАЦИЯ / МОДЕЛИРОВАНИЕ

Аннотация научной статьи по компьютерным и информационным наукам, автор научной работы — Bogatenkov S.A., Gelrud Ya.D.

The guarantee of safe work with information and measuring systems is the implementation of necessary measures that minimize all existing risks, taking into account their degree of influence on safety. These requirements are determined by the need to take into account all risks and interests involved in the implementation of new information technologies. The purpose of the study is to build models for creating and evaluating the effectiveness of systems that provide security when working with information and measurement systems on the basis of a systematic approach to taking into account the impact of risks. To determine the necessary set of measures to ensure security, a model for creating a security system was built. To take into account the interests of all those involved in the process of implementing new information technologies, a model for assessing the effectiveness of the security system has been built. The requirements for the creation and evaluation of the security system are fulfilled by attracting representatives of all the new information technologies involved in the implementation process to the expert group. The example of Chelyabinsk CHPP-2, which operates an automated system of integrated energy accounting, describes the process of building models for creating and evaluating the effectiveness of systems that provide security when working with information and measurement systems. The developed algorithm and the design program of the system providing safety when working with information and measuring systems have made it possible to increase the effectiveness of measures to ensure safe operation at Chelyabinsk CHPP-2. This program will be implemented at energy-intensive enterprises in Chelyabinsk.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «Building models for creating and evaluating the effectiveness of systems that provide security when working with information and measurement systems»

Управление в социально-экономических системах

DOI: 10.14529/ctcr170407

BUILDING MODELS FOR CREATING

AND EVALUATING THE EFFECTIVENESS OF SYSTEMS

THAT PROVIDE SECURITY WHEN WORKING

WITH INFORMATION AND MEASUREMENT SYSTEMS

S.A. Bogatenkov, [email protected], Ya.D. Gelrud, [email protected]

South Ural State University, Chelyabinsk, Russian Federation

The guarantee of safe work with information and measuring systems is the implementation of necessary measures that minimize all existing risks, taking into account their degree of influence on safety. These requirements are determined by the need to take into account all risks and interests involved in the implementation of new information technologies. The purpose of the study is to build models for creating and evaluating the effectiveness of systems that provide security when working with information and measurement systems on the basis of a systematic approach to taking into account the impact of risks. To determine the necessary set of measures to ensure security, a model for creating a security system was built. To take into account the interests of all those involved in the process of implementing new information technologies, a model for assessing the effectiveness of the security system has been built. The requirements for the creation and evaluation of the security system are fulfilled by attracting representatives of all the new information technologies involved in the implementation process to the expert group. The example of Chelyabinsk CHPP-2, which operates an automated system of integrated energy accounting, describes the process of building models for creating and evaluating the effectiveness of systems that provide security when working with information and measurement systems. The developed algorithm and the design program of the system providing safety when working with information and measuring systems have made it possible to increase the effectiveness of measures to ensure safe operation at Chelyabinsk CHPP-2. This program will be implemented at energy-intensive enterprises in Chelyabinsk.

Keywords: information and measuring systems, security, energy accountin, automation, modeling.

1. Introduction

The use of new information technologies provides an increase in labor productivity. However, professional activities in the information society can be dangerous and lead to economic losses. The damage resulting from the use of new information technologies is commensurate with the annual growth of the gross domestic product. The problem of providing technogenic safety is 70 % associated with the human factor [1].

In recent years, there have been more accidents of large-scale failures in large power systems in the world. For example, 14 Aug 2003, in the US there was a cascade failure when the output of one power system element led to its termination due to overload and damage of other elements. As a result, mass power outage covered the largest cities in the north-eastern United States and Canada. The total load loss amounted to 61,800 MW. In the issue, 50 million consumers did not receive electricity on the average about 4 days. The damage in the US alone equaled to about $ 10 billion, and in Canada - more than 2 billion Canadian dollars [2]. This situation is due to a number of reasons. First, energy equipment, communications and means of measuring energy flows in power systems have a sufficiently long period of operation, which leads to the need to increase the number of energy-saving measures aimed at maintaining the operating regime within specified reliability limits.

At the same time, there is a need for frequent disconnections of individual sections of energy flows for routine preventive repairs of equipment, communications, and replacement of measuring instruments. In addition, during the implementation of these measures, the time of finding personnel in the areas of possible electric shock or energy or vibration is increased, which increases the threat to its safety.

Secondly, the error in the measurement of electricity and energy in traditional conditions is quite a large amount, depending on the subjective component associated with the characteristics of the work of the staff. In addition, it is difficult to determine the economically feasible value of peak power. Therefore, in practice, for reasons of reliability, its overestimated value is stated.

Thirdly, failures and damages in the measuring system can distort commercial measurements of energy resources and lead to financial risks of energy supplying organizations. In addition, errors in measurements can be associated with deliberate distortion of measurements to reduce fees for the use of energy resources from the consumer, which leads to the emergence of commercial energy losses.

This situation creates an energy barrier to economic growth, associated with the need to attract additional funds for the implementation of activities aimed at energy security and energy conservation.

The main problem, the solution of which is promoted by the "State Program for Energy Saving and Increasing Energy Efficiency for the Period to 2020", is to overcome the energy barriers to economic growth, including by saving the funds released as a result of the implementation of energy-saving measures, Volumes of inputs of expensive power capacities. One of the main targets for the long-term socio-economic development of the Russian Federation for the period until 2020 is the security of citizens and society [3].

To solve this problem, it is necessary to improve and ensure the highest possible level of automation of electricity generation and transmission and distribution technologies. An effective means for solving the above tasks is the use of automated process control systems and automated information and measuring systems, including automated systems for integrated energy accounting.

However, automation, in addition to increasing the effectiveness of professional activities, is accompanied by the strengthening of traditional and the emergence of new risks to the safety of professional activities [4, 5].

Topical issues of initiatives of academic excellence are management models and the role of the state, methods for assessing the effectiveness and distribution of funding between universities [6].

2. Terms of reference

Using traditional measurement method, we manipulate only daily electric power consumptions that do not allow analyzing the energy consumption dynamics of bad actor by hourly average value. Therefore, a necessary criterion for a decision in relation to the bad actor is the use of automated information measurement system (AIMS), which afford to preserve the value of electricity consumption with discreteness less than one hour.

AIMS of commercial and technical energy audit for all types of energy products allow the company to:

• monitor compliance of actual and allowable power consumption imbalances at the substations and the enterprise as a whole;

• control quickly the electric power utilization degree;

• select and modify the normal scheme of enterprises power supply to minimize the losses of electricity when needed;

• identify the sources of non-normative losses of electricity in the structural units and while power transmission;

• control reactive power on line, to develop measures to derate it in order to decrease technical losses, reduce load of power equipment, increase maintenance periods;

• set energy limits (hour, daily and monthly) for the structural subdivisions of the enterprise and monitor their implementation;

• obtain operational control over the reliability of commercial utility metering;

• make the control over the observance of specific norms of energy consumption in the production process, taking into account the volume of output and quality;

• analyze the efficiency of energy use;

• provide information and to monitor the implementation of energy conservation measures;

• perform analysis to identify cases of inefficient use of energy resources and their causes.

Hardware-software system "Energy" intended for the construction of automated information and

measuring systems (AIMS) of commercial and technical electric power record-keeping - electric and thermal energy, natural and technical gases, steam, hot and cold water, is widely practiced in the industry and energy companies in the Russian Federation. Scientific-Technical Undertaking "Energocontrol", a developer and maker of "Energy", brought more than 1,000 such enterprises on its website [7].

There are various approaches to solving the problems of ensuring the safety of professional activity in the information society. The first approach is based on the use of experience, the second - on the use of mathematical models.

Examples of the first approach include the experience of implementing a distributed information system in a multi-branch organization using the example of FSUE Russian Post [8] and information and measuring systems at Chelyabinsk CHPP-2 [9-14].

The second approach is based on comparing the actual state of the system with an estimate obtained using its mathematical model, which can be developed on the basis of theoretical laws or experimental data. To create mathematical models from experimental data, the methods of principal components and eigenstates are used [15], as well as multidimensional interpolation and approximation based on the theory of random functions [16].

A promising area for the mathematical models construction is the use of methods based on the state estimation theory, assuming the availability of automated information measurement system (AIMS), which forms a system of equations describing its condition or treatment. Measurements of the system regime parameters have information errors, which result in residuals and outs-of-balance in the state equations containing "raw" measurements. The basic idea of state estimation associated with obtaining settlement analogues for all available measurements. The difference between the measurement and its imputed analog is called a residue evaluation. Significant values of residue estimations are a sign of big errors of specific measurements. The method, presented in the article [17], makes it possible to implement a number of useful features of perspective measuring system:

• to improve the accuracy of the measurement of energy, which transportation is carried out with the help of the network infrastructure; The result is the creation of a unified Automated Informational-Measuring System of energy resources control and accounting and the unification of computational parts of systems;

• to choose the best point of the energy measurement installation based on state estimation theory;

• to smooth the measurement uncertainty and minor inconsistencies in the testimony of a measuring system group for ensuring compliance;

• to detect invalid data with the possibility of repeated request, as well as a source of unreliable information and indicate a fault in the system;

• to assess the level of commercial losses and localize them.

With this method, it is possible to identify and eliminate false measurement channels or power leakage and to determine the current state of the power system, which is determined by the readings of generated or consumed electricity of its members. This state may differ from its safe condition.

Based on the application of mathematical models, the problems of automated diagnostics of measuring channels and search for unacceptable energy losses as a result of the introduction of information and measurement systems are solved [ 18-22].

In addition, with the help of models for the safe state of the electric power system, an algorithm and a program for monitoring the observance of a safe operating regime have been developed, which has made it possible to improve the efficiency of measures to ensure the safe operation of equipment and the objectivity of working with personnel [23].

Each specialist in his own way solves the problem of providing security and uses his methods and methods to achieve the set goals. In this case, each of them in its specific case finds its correct solutions. However, as practice shows, the totality of such correct decisions does not give a positive result in sum -the security system as a whole works inefficiently [24].

The guarantee of safe work with information and measuring systems is the implementation of necessary measures that minimize all existing risks, taking into account their degree of influence on safety. These requirements are determined by the need to take into account all risks and interests involved in the process of implementing new information technologies.

Therefore, the goal of the study is to build models for creating and evaluating the effectiveness of systems that provide security when working with information and measurement systems based on a systematic approach to the accounting of the impact of risks. The subjects of the study are models for creating and evaluating the effectiveness of systems that provide security when working with information and measurement systems.

3. Building models for creating and evaluating the efficiency of systems providing safety

in work with information-measuring systems

The practical task of ensuring security is to develop a model of a system of professional activity processes that, based on the scientific and methodological apparatus, would solve the tasks of creating, using and assessing security for the projected and existing systems.

Such models must satisfy a number of requirements.

First, the model should be used as:

• Guidelines for establishing a security system;

• Methods of forming indicators and system requirements;

• Methodologies for assessing the system;

• Model of the system for conducting research.

Secondly, the model must have the properties of universality, complexity, ease of use, visibility and practical focus.

Thirdly, the model should be self-taught and function in conditions of uncertainty of the initial information.

Fourth, the model should:

• Allow to establish the relationship between the indicators;

• Set different levels of protection;

• Receive quantitative estimates;

• Monitor the state of the system;

• Apply different evaluation methods;

• Promptly respond to changes in operating conditions;

• To unite the efforts of different specialists with a single plan.

The model of the information security system - IIS.

The practical task of ensuring information security is to develop an appropriate model that, based on the scientific and methodological apparatus, would solve the tasks of creating, using and evaluating its effectiveness for the projected and existing unique IP. In a simplified form, the IIS model is shown in Fig. 1.

Fig. 1. The IIS Model

The main task of the model is the scientific provision of the process of creating a security system when working with information and measurement systems by assessing the security of decisions taken and choosing a rational option for implementing a security system.

As the object of research, a security system was chosen for working with information and measuring systems at Chelyabinsk CHPP-2.

The model of the security system when working with information and measurement systems seems to be worth considering in a three-dimensional dimension: risks, stages and activities to minimize the impact of risks.

Risks are formed on the basis of specific features of the implementation of distance courses of additional education. In general, they are suggested to be associated with threats of an economic, informational, didactic, psychological and social nature.

Stages (sequence of steps) of the system creation must be implemented for each risk.

The basis for activities that reduce the impact of the risks of any complex system, including security systems for the implementation of distance courses of additional education are:

• Legislative, regulatory and scientific basis;

• Structure and tasks of bodies and units that provide security;

• Organizational-technical and regime measures and methods;

• Software and hardware.

• For each risk and stage, an event that increases safety is defined.

The proposed model of security system representation in the form of a three-dimensional matrix (Table 1) allows not only to strictly monitor mutual relations between security elements, but can act as a guide to the creation of a security system.

Table 1

View security model

Stage Preventive measure

Economic risks

1.1 М1.1

1.2 М1.2

1.3 М1.3

Information risks

2.1 М2.1

2.2 М2.2

2.3 М2.3

Didactic risks

3.1 М3.1

3.2 М3.2

3.3 М3.3

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

Psychological risks

4.1 М4.1

4.2 М4.2

4.3 М4.3

Social risks

5.1 М5.1

5.2 М5.2

5.3 М5.3

As the object of research, a security system was chosen for working with information and measuring systems at Chelyabinsk CHPP-2. For the selected object a security system model is generated (Table 2).

It is also possible to evaluate the effectiveness of an established or already functioning security system on the basis of a three-dimensional matrix. Only now on the indicators (elements of the matrix) must be put appropriate estimates.

The methodology for assessing the degree of influence on the security of various components of threats is based on determining the weighting factors for each activity. For example, each step is associa-

ted with the value of the degree of risk on a three-point scale ("1" - the influence is not significant, "2" -medium, "3" - strong).

The results of using the methodology for assessing the safety management system when working with information and measuring systems at Chelyabinsk CHPP-2 are shown in Table 3.

Table 2

Model of the representation of the security system when working with information and measuring systems at Chelyabinsk CHPP-2

Stage Preventive measure

Economic risks

1.1. Unfounded choice of systems Selection of systems by economic criterion

1.2. The lack of unification of databases Development of a program for the unification of databases

of different systems of various systems

1.3. Loss and distortion of data Organization of a site of on-duty engineers

Information risks

2.1.Subjective errors of personnel Organization of emergency drills

2.2. Uncertain measuring channels The method of searching for unreliable measuring channels

2. 3. Inadmissible energy losses The method of searching for unacceptable energy losses

Didactic risks

3.1. Ineffective organization of the training Organization of effective staff training

process

3.2. Insufficient accounting of employers' Competently oriented training management

requirements

3.3. Insufficient qualification of teachers Teacher training

Psychological risks

4.1. The lack of motivation of personnel Development of a system of moral and material incentives

to apply systems

4.2. The lack of an effective educational Development of an effective educational environment

environment

4.3. Loss of work Staff development

Table 3

The model of the security system assessment when working with information and measuring systems at Chelyabinsk CHPP-2

Stage Weight of risk

Economic risks

1.1. Unfounded choice of systems 3

1.2. The lack of unification of databases of different systems 3

1.3. Loss and distortion of data 3

Information risks

2.1.Subjective errors of personnel 3

2.2. Uncertain measuring channels 3

2. 3. Inadmissible energy losses 3

Didactic risks

3.1. Ineffective organization of the training process 2

3.2. Insufficient accounting of employers' requirements 2

3.3. Insufficient qualification of teachers 2

Psychological risks

4.1. The lack of motivation of personnel to apply systems 1

4.2. The lack of an effective educational environment 1

4.3. Loss of work 2

4. Designing the security system for working with information-measuring systems

The design of a security system for working with information and measurement systems is performed according to the following algorithm:

1. On the basis of knowledge and experience, the expert group creates a model of a security system for working with information and measurement systems, which includes a list of possible risks and preventive measures that minimize them in accordance with Table 1. An example of a security system model for working with information-measuring systems is given in Table 2.

2. On the basis of knowledge and experience, each expert creates a model for assessing the security system when working with information and measurement systems, which include lists of possible risks and their weighting factors. For example, each risk is associated with the value of its weight on a three-point scale ("1" - an insignificant effect, "2" is an average, "3" is a strong one). An example of a security assessment model for working with information and measurement systems is given in Table 3.

3. On the basis of models for assessing the security system when working with information and measurement systems of all experts, a final safety assessment model is created, in which the weight of each risk is defined as the sum of the risk weights from the expert models. An example of the formation of a final model of a security system assessment for working with information and measurement systems is given in Table 4.

4. Based on the final model for assessing the security system when working with information and measuring systems, a plan for creating a security system is developed, in which the deadlines for the implementation of activities are determined by the weights of the corresponding risks of the final model.

Consider the results of the implementation of this algorithm at Chelyabinsk CHPP-2.

In order to determine the full range of measures to ensure security and the implementation of the principle of social justice, the group of experts included both department heads and specialists with higher and secondary vocational education. Therefore, the results of the formation of the final model for the assessment of the security system when working with information and measurement systems reflect the interests of all participants in the process of introducing new information technologies (see Table 4).

Table 4

The final model for assessing the security system when working with information and measuring systems at Chelyabinsk CHPP-2

Stage Wei ght of risk

1 2 3 4 5 6 7 Amount

1.1 3 3 3 3 2 2 2 18

1.2 3 3 3 2 2 2 2 17

1.3 3 3 3 2 3 2 1 17

2.1 3 3 3 2 2 1 2 16

2.2 3 3 3 2 2 2 2 17

2.3 3 3 3 2 2 2 2 17

3.1 2 2 2 3 2 2 2 15

3.2 2 2 2 3 3 2 2 16

3.3 2 2 2 3 3 3 2 17

4.1 1 1 2 3 3 3 3 16

4.2 1 1 2 3 2 3 3 15

4.3 1 2 1 2 3 3 3 15

The results of developing a plan for creating a security system for working with information and measuring systems at Chelyabinsk CHPP-2 are shown in Table 5.

Table 5

The plan of creating a security system for working with information-measuring systems at Chelyabinsk CHPP-2

Stage Preventive measure Deadlines

1.1. Unfounded choice of systems Selection of systems by economic criterion January

1.2. The lack of unification of databases of different systems Development of a program for the unification of databases of various systems February

1.3. Loss and distortion of data Organization of a site of on-duty engineers February

2.1. Subjective errors of personnel Organization of emergency drills March

2.2. Uncertain measuring channels The method of searching for unreliable measuring channels February

2.3. Inadmissible energy losses The method of searching for unacceptable energy losses February

3.1. Ineffective organization of the training Organization of effective staff training April

process

3.2. Insufficient accounting of employers' Competently oriented training management March

requirements

3.3. Insufficient qualification of teachers Teacher training February

4.1. The lack of motivation of personnel to apply systems Development of a system of moral and material incentives March

4.2. The lack of an effective educational Development of an effective educational April

environment environment

4.3. Loss of work Staff development April

As a result of the design of the security system, when working with information and measuring systems, the necessary set of measures for ensuring security is determined, the principle of social justice is implemented and an effective plan for creating a security system is built, by involving representatives of all new information technologies participating in the process of implementation.

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

5. Conclusion

The guarantee of safe work with information and measuring systems is the implementation of necessary measures that minimize all existing risks, taking into account their degree of influence on safety. These requirements are determined by the need to take into account all risks and interests involved in the implementation of new information technologies

To determine the necessary set of measures to ensure security, a model for creating a security system was built.

To take into account the interests of all those involved in the process of implementing new information technologies, a model for assessing the effectiveness of the security system has been built.

The requirements for the creation and evaluation of the security system are fulfilled by attracting representatives of all the new information technologies involved in the implementation process to the expert group.

On the example of Chelyabinsk CHPP-2, which operates an automated system of integrated energy accounting, describes the process of building models for creating and evaluating the effectiveness of systems that provide security when working with information and measurement systems.

The developed algorithm and the program for designing a system that provides security when working with information and measuring systems have made it possible to improve the efficiency of measures to ensure safe operation at Chelyabinsk CHPP-2.

References

1. Tolmachev V.D. [On the Staffing of Modern Energy]. Energy Security and Energy Conservation, 2011, no. 1, pp. 37-38. (in Russ.)

2. Loginov E.L., Raykov A.N. [Network Information Attack on the Control Systems of Critical Infrastructure Energy Facilities]. Thermal Engineering, 2015, no. 4, pp. 3-9. (in Russ.) DOI: 10.1134/s0040363615040050

3. Gosudarstvennaya programma energosberezheniya i povysheniya energeticheskoy effektivnosti na period do 2020 goda [State Program of Energy Saving and Energy Efficiency Improvement for the Period until 2020]. Available at: http://www.ceskom.ru/files/normativ/energosafe/energysafeprogram.pdf.

4. Gnatyshina E.A., Bogatenkov S.A., Gnatyshina E.V., Uvarina N.V. Informatsionnaya podgo-tovka pedagogov professional'nogo obucheniya v aspekte bezopasnosti [Information Preparation of Teachers of Vocational Training in the Aspect Withoutrity]. Chelyabinsk, Chelyabinsk St. Ped. Univ. Publ., 2015, 415 p.

5. Bogatenkov S.A. [Training of Personnel to Work with Information and Measurement Systems in the Security Aspect]. Energy Security and Energy Conservation, 2017, no. 4, pp. 34-39. (in Russ.)

6. Upravleniye initsiativami akademicheskogo prevoskhodstva - nastoyashchiy intellektual'nyy vyzov [Managing of the Initiatives of Academic Excellence is a Real Intellectual Challenge]. Available at: http://5top100.ru/news/39143.

7. Sayt frmy OOO NTP "Energokontrol"' [Site of Company "Energy Control"]. Available at: http://www.energocontrol.ru (accessed 01.02.2017)

8. Morgunov A.F. [The Introduction of a Distributed Information System in a Multi-Branch Organization: the Experience of FSUE Russian Post]. Business Informatics, 2014, no. 1, pp. 34-41. (in Russ.)

9. Petrov V.V., Bogatenkov S.A., Varypaev E.S., Rayskiy Yu.B. [Experience of Implementation and Prospects of Development of the Automated Information System of Support of Operational Staff at Chelyabinsk CHP-2]. Industrial Power, 1997, no. 8, pp. 35-37. (in Russ.)

10. Bogatenkov S.A., Krestinin E.N. [Experience of Implementation and Prospects of Development of the Automated Information System Support for Maintenance Personnel at Chelyabinsk CHP-22]. Industrial Power, 1997, no. 11, pp.14-16. (in Russ.)

11. Bogatenkov S.A., Barrakov N.N., Vasilyev V.A. [Experience of Implementation and Prospects of Development of APCS at Chelyabinsk CHP-2]. Industrial Power, 1999, no. 1, pp. 11-15. (in Russ.)

12. Bogatenkov S.A., Barrakov N.N., Tarasov I.M. [Experience of Implementation and Prospects of Development of the Automated Dispatch Control System at Chelyabinsk CHP-2]. Industrial Power, 1999, no. 2, pp. 6-9. (in Russ.)

13. Bogatenkov S.A., Varypaev E.S. [Experience in the Implementation and Operation of the Workstation Engineer of Production and Technical Department and the Technical Means to "Energy" on the Chelyabinsk CHPP-2]. Industrial Power, 1996, no. 11, pp. 7-8. (in Russ.)

14. Mokeyev V.V., Vorobiev D.A. Analysis of Socio-Economic System Processes Performance with the Help of Eigenstate Models. Bulletin of the South Ural state University. Ser. Mathematical Modeling and Programming, 2015, vol. 8, no. 1, pp. 66-75. DOI: 10.14529/mmp150105

15. Kolchev K.K., Mezin S.V. [Constructing Mathematical Models for Simulating the Technological Processes in Thermal Power Equipment on the Basis of Statistical Approximation Methods]. Thermal Engineering, 2015, no. 7, pp. 503-510. (in Russ.) DOI: 10.1134/s0040363615070048

16. Pazderin A.V., Sofin V.V., Samoylenko V.O. [The Mathematical Method of Monitoring the Reliability of the Measurement Data on the Flows of Energy Resources on the Basis of the Theory of Estimation State]. Thermal Engineering, 2015, no. 11, pp. 26-31. (in Russ.)

17. Bogatenkov S.A. [Improving the Efficiency of Energy-Saving Measures with the Help of Automated Energy Accounting]. Industrial Power, 1997, no. 12, pp. 2-5. (in Russ.)

18. Bogatenkov S.A., Tarasov I.M. [Methods of Measuring Channels of Technical Diagnostics of the Technical Means "Energy"]. Electrical Safety, 1996, no. 2, pp. 19-22. (in Russ.)

19. Krestinin E.I., Bogatenkov S.A. [The Computer Program of Measuring Channels of Technical Diagnostics of the Technical Means "Energy"]. Electric Stations, 1999, no. 3, pp. 64-65. (in Russ.)

20. Bogatenkov S.A., Trubina E.N., Bogatenkov D.S. [Search Automation Unacceptable Energy Losses via Automated Energy Accounting]. Electrical Safety, 1998, no. 3-4, pp. 39-46. (in Russ.)

21. Bogatenkov S.A., Bortkewich E.S. [Technical Diagnostics Measuring Channels Automation with Automated Energy Accounting]. Electrical Safety, 1999, no. 1, pp. 39-44. (in Russ.)

22. Kirievskiy E.V. [Technical Diagnostics of Power Equipment: Problems, Trends, Prospects]. Cable-news, 2006, no. 9, pp. 18-19. (in Russ.)

23. Bogatenkov S.A., Malovechko S.N., Kosterin V.V. Secure State Power System Models Building. 2016 2nd International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM). DOI: 10.1109/ICIEAM.2016.7911642

24. Gelrud Ya.D., Loginovskiy O.V. Upravlenie proektami: metody, modeli, sistemy: monografiya [Project Management: Methods, Models, Systems: Monograph]. South Ural St. Univ. Publ., 2015. 330 p.

Received 10 August 2017

УДК 681.31 DOI: 10.14529/^сг170407

ПОСТРОЕНИЕ МОДЕЛЕЙ СОЗДАНИЯ И ОЦЕНКИ ЭФФЕКТИВНОСТИ СИСТЕМ, ОБЕСПЕЧИВАЮЩИХ БЕЗОПАСНОСТЬ ПРИ РАБОТЕ С ИНФОРМАЦИОННО-ИЗМЕРИТЕЛЬНЫМИ СИСТЕМАМИ

С.А. Богатенков, Я.Д. Гельруд

Южно-Уральский государственный университет, г. Челябинск, Россия

Гарантией безопасной работы с информационно-измерительными системами является выполнение необходимых мероприятий, сводящих к минимуму все существующие риски с учетом их степени влияния на безопасность. Эти требования определяются необходимостью учета всех рисков и интересов участвующих в процессе внедрения новых информационных технологий. Целью исследования является построение моделей создания и оценки эффективности систем, обеспечивающих безопасность при работе с информационно-измерительными системами на основе системного подхода к учету влияния рисков. Для определения необходимого комплекса мероприятий, обеспечивающих безопасность, построена модель создания системы безопасности. Для учета интересов всех участвующих в процессе внедрения новых информационных технологий построена модель оценки эффективности системы безопасности. Требования к созданию и оценке системы безопасности выполняются благодаря привлечению в группу экспертов представителей всех участвующих в процессе внедрения новых информационных технологий. На примере Челябинской ТЭЦ-2, эксплуатирующей автоматизированную систему комплексного учета энергии, описан процесс построения моделей создания и оценки эффективности систем, обеспечивающих безопасность при работе с информационно-измерительными системами. Разработанный алгоритм и программа проектирования системы, обеспечивающей безопасность при работе с информационно-измерительными системами, позволили повысить эффективность мероприятий по обеспечению безопасной работы на Челябинской ТЭЦ-2.

Ключевые слова: информационно-измерительные системы, безопасность, учет энергоресурсов, автоматизация, моделирование.

Литература

1. Толмачев, В.Д. О кадровом обеспечении современной энергетики / В.Д. Толмачев // Энергобезопасность и энергосбережение. - 2011. - № 1. - С. 37-38.

2. Логинов, Е.Л. Сетевые информационные атаки на системы управления энергетическими объектами критической инфраструктуры / Е.Л. Логинов, А.Н. Райков // Теплоэнергетика. -2015. - № 4. - С. 3-9. (т Russ.) БОГ. 10.1134^0040363615040050

3. Государственная программа энергосбережения и повышения энергетической эффективности на период до 2020 года. - http://www.ceskom.ru/files/normativ/energosafe/energysafe_ program.pdf.

4. Информационная подготовка педагогов профессионального обучения в аспекте безопасности / Е.А. Гнатышина, С.А. Богатенков, Е.В. Гнатышина, Н.В. Уварина. - Челябинск: Изд-во Челяб. гос. пед. ун-та, 2015. - 415 с.

5. Богатенков, С.А. Подготовка персонала к работе с информационно-измерительными системами в аспекте безопасности / С.А. Богатенков // Энергобезопасность и энергосбережение. - 2017. - № 1. - С. 34-39.

6. Управление инициативами академического превосходства - настоящий интеллектуальный вызов. - http://5top100.ru/news/39143/ (дата обращения: 29.05.2017).

7. Сайт фирмы ООО НТП «Энергоконтроль» - http://www.energocontrol.ru (дата обращения: 01.02.2016).

8. Моргунов, А.Ф. Внедрение распределенной информационной системы в многофилиальной организации: опыт ФГУП «Почта России» / А.Ф. Моргунов // Бизнес-информатика. - 2014. -№ 1. - С. 34-41.

9. Опыт внедрения и перспективы развития автоматизированной системы информационной поддержки оперативного персонала на Челябинской ТЭЦ-2 / В.В. Петров, С.А. Богатенков, Э.С. Варыпаев, Ю.Б. Райский //Промышленная энергетика. - 1997. -№ 8. - С. 35-37.

10. Богатенков, С.А. Опыт внедрения и перспективы развития автоматизированной системы информационной поддержки ремонтного персонала на Челябинской ТЭЦ-2 / С.А. Богатенков, Е.Н. Крестинин //Промышленная энергетика. - 1997. - № 11. - С. 14-16.

11. Богатенков, С.А. Опыт внедрения и перспективы развития АСУ ТП на Челябинской ТЭЦ-2 / С.А. Богатенков, Н.Н. Бараков, В.А. Васильев // Промышленная энергетика. - 1999. -№ 1. - С. 11-15.

12. Богатенков, С.А. Опыт внедрения и перспективы развития автоматизированной системы диспетчерского управления на Челябинской ТЭЦ-2 / С.А. Богатенков, Н.Н. Бараков, И.М. Тарасов //Промышленная энергетика. - 1999. - № 2. - С. 6-9.

13. Богатенков, С.А. Опыт внедрения и эксплуатации автоматизированного рабочего места инженера производственно-технического отдела и комплекса технических средств «Энергия» на ТЭЦ-2 Челябинска / С.А. Богатенков, Э.С. Варыпаев // Промышленная энергетика. -1996. - № 11. - С. 7-8.

14. Mokeyev, V.V. Analysis of Socio-Economic System Processes Performance with the Help of Eigenstate Models / V.V. Mokeyev, D.A. Vorobiev // Вестник ЮУрГУ. Серия «Математическое моделирование и программирование», 2015. - Т. 8, № 1. - С. 66-75. DOI: 10.14529/mmp150105

15. Колчев, К.К. Построение математических моделей технологических процессов теплоэнергетического оборудования на основе статистических методов аппроксимации / К.К. Колчев, С.В. Мезин // Теплоэнергетика. - 2015. - № 7. - С. 503-510. DOI: 10.1134/s0040363615070048

16. Паздерин, А.В. Математический метод контроля достоверности измерительной информации о потоках энергетических ресурсов на основе теории оценивания состояния / А.В. Паз-дерин, В.В. Софьин, В.О. Самойленко // Теплоэнергетика. - 2015. - № 11. - С. 26-31.

17. Богатенков, С.А. Повышение эффективности мероприятий по энергосбережению с помощью автоматизированных средств учета энергии / С.А. Богатенков // Промышленная энергетика. - 1997. - № 12. - С. 2-5.

18. Богатенков, С.А. Методика технической диагностики измерительных каналов комплекса технических средств «Энергия» / С.А. Богатенков, И.М. Тарасов // Электробезопасность. -1996. - № 2. - С. 19-22.

19. Крестинин, Е.И. Компьютерная программа технической диагностики измерительных каналов комплекса технических средств «Энергия» / Е.И. Крестинин, С.А. Богатенков, Ю.Б. Райский // Электрические станции. - 1999. - № 3. - С. 64-65.

20. Богатенков, С.А. Автоматизация поиска недопустимых потерь энергии с помощью автоматизированных средств учета энергии / С.А. Богатенков, Е.Н. Трубина, Д.С. Богатенков // Электробезопасность. - 1998. - № 3-4. - С. 39-46.

21. Богатенков, С.А. Автоматизация технической диагностики измерительных каналов с помощью автоматизированных средств учета энергии / С.А. Богатенков, Е.С. Борткевич // Электробезопасность. - 1999. - № 1. - С. 39-44.

22. Кириевский, Е.В. Техническая диагностика энергетического оборудования: проблемы, тенденции, перспективы /Е.В. Кириевский //Кабельные новости. - 2006. - № 9. - С. 18-19.

23. Bogatenkov, S.A. Secure state power system models building / S.A. Bogatenkov, S.N. Ma-

lovechko, V.V. Kosterin // 2016 2nd International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM). DOI 10.1109/ICIEAM. 2016.7911642

24. Гельруд, Я.Д. Управление проектами: методы, модели, системы: моногр. /Я.Д. Гельруд, О.В. Логиновский; под ред. д-ра техн. наук, проф. А.Л. Шестакова. - Челябинск: Издат. центр ЮУрГУ, 2015. - 330 с.

Богатенков Сергей Александрович, канд. техн. наук, доцент кафедры информационных технологий в экономике, Южно-Уральский государственный университет, г. Челябинск; ser-bogatenkov@ yandex.ru.

Гельруд Яков Давидович, д-р техн. наук, профессор кафедры информационно-аналитического обеспечения управления в социальных и экономических системах, ЮжноУральский государственный университет, г. Челябинск; [email protected].

Поступила в редакцию 10 августа 2017 г.

ОБРАЗЕЦ ЦИТИРОВАНИЯ

FOR CITATION

Bogatenkov, S.A. Building Models for Creating and Evaluating the Effectiveness of Systems that Provide Security when Working with Information and Measurement Systems / S.A. Bogatenkov, Ya.D. Gelrud // Вестник ЮУрГУ. Серия «Компьютерные технологии, управление, радиоэлектроника». - 2017. - Т. 17, № 4. -С. 54-65. DOI: 10.14529/ctcr170407

Bogatenkov S.A., Gelrud Ya.D. Building Models for Creating and Evaluating the Effectiveness of Systems that Provide Security when Working with Information and Measurement Systems. Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control, Radio Electronics, 2017, vol. 17, no. 4, pp. 54-65. DOI: 10.14529/ctcr170407

i Надоели баннеры? Вы всегда можете отключить рекламу.