INTELLECTUAL STRETEGY OF SECURITY ON BASE CHOSING OF ARCHITECTURE COMPUTING AND NEUROPROCESSING NETS
V.N. Ruchkin, B.V. Kostrov, V.A. Fulin
Ryazan State University named for S.A.Yesenin
Ryazan State Radio Engineering University
Annotation: The research addresses four strategies of information security: the strategy game of chicken, balance of business incentives and desire to “balance on the brink” (brinkmanship), formation of sufficient security with minimal effort for customers and consumers, worsening, and in some cases improving security of its infrastructure and the Security Maturity Model (IoT SMM) is demonstrated. The benefits of the latter strategy are assessed through choosing an architecture with the core of the IoT security maturity model as a hierarchy of security practices. Algorithms for ensuring cyber security and protection against threats are analysed. We propose a method for analysis and selection of the best architecture for multicore hierarchical clustering of computing systems and implement an expert system based on chip MCNPAoC SBIS 1879ВМ8Y chip module MC 127.05, complete with a user interface.
Keywords: defense strategies, the game of chicken, balance of business incentives, infrastructure security, Security Maturity Model, architecture, multicore, hierarchical clustering, expert system, user interface