should be developed to establish the necessary values 
for  the  indicators  of  the  appearance,  identification, 
neutralization of the problem and the qualification of 
the manager. 
4  CONCLUSIONS 
The resulting management decision model allows us 
to  quantify  the  performance  of  the  firewall  and 
information  security  in  general.  As  a  result,  it  is 
necessary to control the control by setting the level of 
the safety indicator and the frequency of failures, in 
order to  obtain  the  necessary  values for  the  time of 
identification  and  neutralization  of  the  problem. 
Based on the data obtained, the information security 
plan can be adjusted in the future. 
Without  a  doubt,  a  firewall  is  one  of  the  main 
security tools, but its presence alone cannot guarantee 
complete security. Firewall settings should be tailored 
to your needs, taking into account your threats, risks, 
and  IT  infrastructure.  You  should  also  constantly 
check the operation of the firewall and document all 
actions so that the firewall protects you as effectively 
as possible. 
The  developed  model  is  based  on  the  NSA  and 
LCIO,  therefore,  meet  the  requirement of  adequacy 
(Burlov, 2017.). On its basis, it is possible to develop 
a technology for ensuring information security. 
The  information  security  model  is  based  on  the 
system  integration  of  three  processes.  Threat 
formation. The process of recognizing the threat. The 
process  of  eliminating  the  threat.  The  level  of 
information  security  is  assessed  by  the  probability 
that each threat will be detected and eliminated. The 
results of the simulation confirmed the main trends in 
the process of ensuring information security. The new 
concept of ensuring information security, in contrast 
to the known ones, allows you to create conditions for 
ensuring  information  security  according  to  the 
developed  model.  The  use  of  LCIO  allows  the 
decision-maker  to  form  processes  with  predefined 
properties.  This  reduces  the  level  of  risk  when 
achieving the goal of ensuring information security. 
The proposed mathematical apparatus allows you 
to  build  a  mathematical  model  of  a  management 
decision and on the basis of this link the three most 
important  processes  in  the  organization  of  security. 
Due to this mathematical model, security is ensured. 
The  use  of  a  synthesis-based  modelling  approach 
makes it possible to build such a system as a system 
for  managing  the  process  of  ensuring  the  safety  of 
work  in  the  face  of  threats  of  emergency  situations 
based on the required level of the efficiency indicator. 
Accordingly, a system built on such principles will be 
devoid  of  the  main  drawback  –  the  discrepancy 
between  the  management  results  and  expectations. 
This  approach  allows  you  to  evaluate  any  decision 
made from the perspective of time and resource costs, 
as  well  as  to  establish  a  clear,  scientifically  based 
relationship  between  the  decision  made  and  the 
results of the action. 
ACKNOWLEDGEMENTS 
The reported study was funded by Russian Ministry 
of Science (information security), project № 08/2020. 
REFERENCES 
Abramov, V.M., Burlov, V.G. and Tatarnikova, T.M. 
(2021).  Digital  Technologies  Development  for  Geo-
Information  Support  of  Techno-Sphere  Security  in 
Arctic  and  Subarctic.  IOP Conference Series: Earth 
and Environmental Science, 666(5): 052076 
Andreev,  A.V.,  Burlov,  V.G.  and  Grachev,  M.I.  (2019). 
Information  technologies  and  synthesis  of  the 
management  process  model  in  the  enterprise.  2019 
International Science and Technology Conference 
"EastConf", 8725428 
Anokhin,  P.  K.  (1979).  System mechanisms of higher 
nervous activity, M.: Science, p. 453. 
Burlov V.G.  and Popov  N.N. (2017). Management of the 
application of the  space geoinformation system in the 
interests  of  ensuring  the  environmental  safety  of  the 
region. Advances in the Astronautical Sciences, pages 
751-760. 
Burlov V.G., Abramov V.M., Istomin E.P., Fokicheva A.A. 
and Sokolov A.G. (2018). The methodological basis for 
the  strategic  management  of  territory  development. 
18th International Multidisciplinary Scientific 
GeoConferences SGEM 2018. Conference 
proceedings, pages 483-490. 
Burlov, V. G. (2017). The law of preserving the integrity of 
the object - the method of the basis for solving the 
problems of information warfare and ensuring security. 
Neurocomputers and their applications,  pages  261-
263. 
Burlov, V. G., Andreev, A. V. and Gomazov, F. A. (2018). 
Safety management of a technosphere object based on 
the law of preserving the integrity of the object. Federal 
State  Budgetary  Educational  Institution  of  Higher 
Education  "St.  Petersburg  State  University  of 
Economics (SPbSEU)", pages 56-60. 
Burlov, V. G., Andreev, A. V. and Gomazov, F. A. (2018). 
Safety management of a technosphere object based on 
the law of preserving the integrity of the object. Federal 
State  Budgetary  Educational  Institution  of  Higher 
INFSEC 2021 - International Scientific and Practical Conference on Computer and Information Security