Administration of access rights to the corporate network with the integrated automation of the bank

Chaplyga V., Nyemkova E., Ivanishin S., Shandra Z.

Vyacheslav Chaplyga-1, Elena Nyemkova-1, Serge Ivanishin-1, Zenon Shandra-2 

  1. Lviv Institute of Banking the University of Banking of the NBU,
  2. National university Lviv Polytechnic

The article is devoted to the administration of access rights in Role-Based model Access Control to the corporate banking networks. Four main functional roles are offered in accordance with the international standard CobiT. The problem of remote connectivity to information resources of banks in terms of security is similar to the problem BYOD. There are proposed an algorithm of the automated control of remote access. The algorithm is based on the separation of the work area in the virtual space of the bank's server. The mathematical model of access for basic functional roles is presented.

1. Девянин П. Н. Модели безопасности компьютерных систем / П. Н. Девянин. – М. Издательский центр “Академия”, 2005. – 144 с. 2. Cobit 4.1 IT Governance Institute; Cobit%204.1 3. Автоматизация аудита в IT Аудит: Аудитор; 4. IT Аудит: Аудитор 4.0; 5. Audit XP “Комплекс аудит”; 6. А. Астахов. Модель информационной безопасности BYOD, 17-07-2014; 7. Зегжда Д. П., Івашко А. М. Основы безопасности информационных систем. – М.: Горячая линия – Телеком, 2000. 8. Обеспечение информационной безопасности на стадиях жизненного цикла автоматизированных банковских систем, Дата введения: 2014-09-01; 6-2014-obespechenie-informacionnoi-bezopasnosti-na-stadiyah-zhiznennogo-cikla-avtomatizirovannyh - bankovskih-sistem. 9. D.R. Kuhn, E.J. Coyne, and T.R. Weil, “Adding Attributes to Role Based Access Control,” Computer, vol. 43, no. 6, 2010; documents/kuhn-coyneweil-10.pdf. 10. E.J. Coyne, T.R. Weil, ABAC and RBAC:Scalable, Flexible, and Auditable Access Management, IEEE IT Professional, May/June 2013; coyne-weil-13.pdf. 11. Щеглов К. А., Щеглов А. Ю. Новый подход к реализации контроля и разграничения прав доступа к данным в информационных системах; август 2014;