@article{MAKHILLJEAS2019141017870, title = {Applying a Mathematical Approach to Interpreting the Results of Testing Software and Hardware Data Security Tools During the Verification Process}, journal = {Journal of Engineering and Applied Sciences}, volume = {14}, number = {10}, pages = {3482-3491}, year = {2019}, issn = {1816-949x}, doi = {jeasci.2019.3482.3491}, url = {https://makhillpublications.co/view-article.php?issn=1816-949x&doi=jeasci.2019.3482.3491}, author = {Andrey M. and}, keywords = {Software and hardware DST verification,optimization and decision making theories,AHP,SAW,verification algorithm of software and hardware DST,program “verifier of software and hardwareDST”,verification of access control subsystem}, abstract = {The study is devoted to the issues of applying existent mathematical apparatus from optimization and decision making theories for verification of software and hardware Data Security Tools (DST). The study contains an algorithm which can be used to verify such DST and which presupposes formal assessment of criticality of the errors found during testing in the security functions of such security tools and algorithms used to calculate the total error criticality before the DST is integrated into an information system. The study also describes software implementation of the proposed verification algorithm which represents a decision support system making it possible to automatically evaluate criticality of the errors found in the security tools. Presented software implementation takes into account not only criticality of the errors and their number but also criticality of the security functions in which such errors were detected during testing of the software and hardware DST. In case of taking into account the criticality of the security functions of DST the new level of individual criteria is added to the hierarchical structure of the decision making task for which criteria with errors will be considered as embedded local criteria.} }