Defense Ministry creates ultra-secure "cloud" storage

45
The Russian military will receive a “iCloud-protected” - cloud storage for service information, according to News.





Specialists have begun to create a network of geographically distributed disaster-resistant data processing centers (TRKTSOD). She will be connected to the "military Internet". The system segment is already operating in the Southern District.

The full formation of the TRCC is planned to be completed by 2020 year. This year, the bulk of the work is to be completed. The cost of the project was 390 million rubles.

The system segment operating in the Southern Military District has been tested, its application experience has been recognized as successful. Further similar storage of digital data will appear in each district. While there will be at least one segment of the TRCC, all information will be available to military users.

Within the system, it will be possible to transmit huge amounts of information in a matter of seconds (big data technology). An e-mail server with secret data transmission, including information with a “special importance” stamp, is deployed inside the network.

According to experts, TRKTSOD is actually a “cyber fortress”. This special network is not connected to the normal Internet. All software is exclusively Russian.

As noted by the Advisor to the President of the Russian Federation on Internet issues, German Klimenko, the Ministry of Defense of the Russian Federation is among the leaders in import substitution in the field of high technologies.

According to him, the military department is well aware of the importance of introducing modern technologies. In the armed forces, they use various Drones, robotic complexes, decision support algorithms, etc. The military solves difficult tasks in managing mass flights, the movements of a large number of people and equipment.

Moreover, Russian military technologies have two important advantages: they are simple and reliable, the expert added.
  • Ministry of Defense of the Russian Federation
Our news channels

Subscribe and stay up to date with the latest news and the most important events of the day.

45 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. +2
    5 June 2018 14: 02
    The project cost amounted to 390 million rubles.
    A penny for a very necessary thing ... I wonder who does the anti-virus protection?
    1. +2
      5 June 2018 14: 14
      For pennies you will receive billions of damage. Or millions of lives, which is much more important.
    2. +1
      5 June 2018 14: 16
      Quote: KVU-NSVD
      and who does antivirus protection?

      But is she needed there? the system is closed, there is nothing for strangers to do there
      1. +2
        5 June 2018 14: 33
        Quote: LSA57
        Quote: KVU-NSVD
        and who does antivirus protection?

        But is she needed there? the system is closed, there is nothing for strangers to do there

        The system is then closed, but it is more than realistic to infect the system from a closed terminal. Nobody has canceled spies and mishandled Cossacks in the military environment, including those with a strong tolerance.
        1. +1
          5 June 2018 15: 52
          Quote: KVU-NSVD
          Nobody has canceled spies and mishandled Cossacks in the military environment, including those with a strong tolerance.

          and then moreover, no protection will help
        2. +1
          5 June 2018 15: 54
          Quote: KVU-NSVD
          Quote: LSA57
          Quote: KVU-NSVD
          and who does antivirus protection?

          But is she needed there? the system is closed, there is nothing for strangers to do there

          The system is then closed, but it is more than realistic to infect the system from a closed terminal. Nobody has canceled spies and mishandled Cossacks in the military environment, including those with a strong tolerance.

          These systems are developed on the basis of operating systems (from relatives of Linux), in which viruses take root very poorly, and even security protocols such that the virus has nowhere to live there, and all traffic is encrypted, so the issue of antivirus will not be relevant. In terms of spies, this is the main threat, more than viruses. For example, a photo from a monitor, etc.
          1. +5
            5 June 2018 15: 59
            Quote: Alex-a832
            These systems are developed on the basis of operating systems (from relatives of Linux), in which viruses take root very poorly, and even security protocols, such that the virus has nowhere to live, and all traffic is encrypted, so the issue of antivirus will not be relevant.

            "..That one person did, then another can forever break .." (c) lol Protection is needed on any, even seemingly super-protected system. And in the case of the secret data storage it is better to overdo it than ...
            1. +3
              5 June 2018 16: 53
              Quote: KVU-NSVD
              Protection is needed on any, even seemingly super-secure system

              laughing
              1. +2
                5 June 2018 16: 57
                You certainly have very imaginative thinking. good but generally true .... winked
            2. +1
              5 June 2018 17: 26
              Quote: KVU-NSVD
              ".. What one person did, then another can forever break .." (c) Protection is needed on any, even seemingly super-protected system. And in the case of the secret data storage it is better to overdo it than ...

              laughing
              So yes, but until someone comes up with a virus, you won’t make an antivirus for it. There is only such a sequence ...
              1. +2
                5 June 2018 17: 30
                The need for protection against known threats is not canceled by the presence of potential threats ...
      2. 0
        5 June 2018 19: 28
        Quote: LSA57
        But is she needed there? the system is closed, there is nothing for strangers to do there

        Well, there’s a flash drive ???
    3. +1
      5 June 2018 14: 18
      like who???? a leading specialist in the world, a lieutenant of the KGB of the USSR, of course .... McCaffee doesn’t trust ... and really is not expensive ...
    4. +1
      5 June 2018 14: 23
      Quote: KVU-NSVD
      I wonder who does antivirus protection?

      In a normal system, they struggle with holes, and do not engage in garbage with antiviruses.
  2. +1
    5 June 2018 14: 06
    I suspect these data centers will be buried, otherwise it makes no sense. In a direct military conflict, they can simply be destroyed in the first place. The issue of energy supply I think will be resolved DIBP guaranteed power supply.
  3. +3
    5 June 2018 14: 06
    Oh, my heart feels, this tyrnet will not bring to good. To store all military info on one server, I think not the safest solution. As far as I remember, recently there was information that the FSB returned to paperwork and storage of information.
    1. +5
      5 June 2018 14: 12
      This is not just a server, it is a cluster of several hundred processors and several thousand drives with a storage capacity of several million terabytes. With a mirrored data storage and processing system.
      1. +2
        5 June 2018 14: 23
        Large battalions decide everything. Both in defense and in attack. In this case too. And the presence of supercomputers in the first 10-ke. But ours are not there and is not yet in sight. And why so enthusiastic?
        But once upon a time, in a "rotten" scoop, we were the first in this. So far, they have not passed by order of the near supreme rulers to copy Western technology.
        1. +1
          5 June 2018 15: 08
          Quote: NordUral
          But once upon a time, in a "rotten" scoop, we were the first in this.

          We were never the first there. Although there were proposals, but the top of the CPSU refused
          1. 0
            5 June 2018 19: 28
            Learn materiel, please.
            1. 0
              6 June 2018 08: 45
              Add:
              https://topwar.ru/61010-mify-ssha-otstalost-sovet
              skoy-kompyuternoy-techniki.html

              https://cont.ws/@anddan01/734408
              1. 0
                6 June 2018 09: 03
                And last but not least:
                At the end of the 60s, the country's leadership made a decision that had, as the course of further events showed, catastrophic consequences: to replace all medium-sized domestic developments of various sizes (there were half a dozen of them - “Minsk”, “Ural”, different versions of the M-20 architecture etc.) - to the Unified Family of computers based on the IBM 360 architecture, - the American equivalent. At the level of the Ministry of Appliance, a similar decision was not so loudly taken with respect to minicomputers. Then, in the second half of the 70s, the PDP-11 architecture of a foreign company DEC was also approved as the general line for mini- and micro-computers. As a result, domestic computer manufacturers were forced to copy obsolete samples of IBM computing technology. That was the beginning of the end.
                1. 0
                  6 June 2018 12: 34
                  Further development of IBM / 360 was the system 370, 390 and System z. The IBM / 360 architecture was so successful that it has become the de facto industry standard until today.
                  I read the initial data that there were a bunch of incompatible computers in the USSR, the lack of a unified architecture, the lack of the ability to scale architecture and its high cost, I conclude that The CPSU made the only right decision. The CPSU is a shaky structure, which in 90% of cases makes the wrong decisions, in this case everything is correct, I think because the best employees of research institutes related to computer science were involved in the decision.
                  1. 0
                    6 June 2018 14: 24
                    Yes, the leadership that this crime committed made a really right decision for the collapse of the Union (including the right ones with others).
                    1. 0
                      6 June 2018 15: 12
                      Why a crime? Argument. I personally do not see anything wrong with that. They could not come up with a standard themselves, they took a good solution from others.
                      1. 0
                        6 June 2018 16: 06
                        They could not, but did not give. The top did not need either supercomputers in combination with the planned economically new level, or personal computers. So they ordered to trail behind the cart.
      2. 0
        6 June 2018 14: 29
        The question is - will all this miracle be in one place or several and remote?
    2. 0
      5 June 2018 14: 18
      Quote: Gronsky
      As far as I remember, recently there was information that the FSB returned to paperwork and storage of information.

      but no one refused the paper. that's how the bond has always been duplicated by feet laughing
  4. +1
    5 June 2018 14: 06
    Nothing happens beyond the protected. Although the best hackers are Russian.
    1. +1
      5 June 2018 14: 18
      They have already left almost everything, as that. And sad. Hope for the young and patriotic. But with such power and with such a "social" "state" the new growth will also be scattered.

      And in general - tired of boasting of bureaucrats of power, got contradictory, and often false informational stuffing.
    2. +1
      5 June 2018 14: 28
      If there is "special importance", then hell decipher.
  5. +1
    5 June 2018 14: 07
    Cloudy means affordable, albeit with great, or very great difficulty. But in the end, it’s still being revealed. In vain the guys entertain themselves with such hopes.
    I wrote and remembered an old Italian film about the robbery of a relic of some kind in a church from a shop window with armored glass. There the robbers fought, fought, beat-beat, but nothing came of it. When leaving, one of them threw a hammer or chisel in his hearts, I don’t remember. And the glass armor took and crumbled.
    So with this cloud it can happen, an eccentric poke with a finger horseradish knows where, and the door will swing open, so, by chance.
    1. 0
      5 June 2018 14: 19
      Quote: NordUral
      Cloudy means affordable, albeit with great or very great difficulty

      and where is the access from?
      This special network is not connected to the regular Internet.
      1. 0
        5 June 2018 14: 30
        The system is geographically distributed, which means that a loophole can be found.
        1. 0
          5 June 2018 14: 35
          Quote: NordUral
          The system is geographically distributed, with

          that's it. two computers in one room, for example, are interconnected by one wire. there is no way out. Well?
          1. +3
            5 June 2018 15: 48
            Comrade Marshal. Stop cornering people .. smile Well, people of this specificity do not know .. smile Let them at least quarrel ... lol I left a couple of comments, nobody understood anything ... smile
            1. 0
              5 June 2018 15: 55
              Quote: Zubr
              I left a couple of comments, nobody understood anything ...

              smiled)
              Comrade Marshal. Stop cornering people

              got it smile
            2. +3
              5 June 2018 16: 26
              Quote: Zubr
              I left a couple of comments, nobody understood anything ...

              Easier - did not want to understand.Yes There are people for whom there are only two types of opinions: their own and wrong. There are already no arguments working. laughing A couple of comments, by the way, remarkably complemented the article. hi
              1. 0
                6 June 2018 20: 28
                The right opinion is that which is proven. But in the article and comments, only words.
                Said in the article cloud - means cloud, distributed geographically. It also means that when access is achieved, it is opened. Etc.
                And do not crush with sophisticated terms, the truth is always simple, like a broom.
            3. 0
              6 June 2018 14: 26
              Incomprehensible we, my friend. And we do not want to admire, as well as throwing bonnets into the air.
          2. 0
            5 June 2018 19: 29
            This is not about one bunker in one place.
  6. 0
    5 June 2018 18: 08
    Rubik's Cube for officers - monochrome, for generals - monolithic ...
  7. 0
    6 June 2018 01: 06
    The idea is this: where we are not talking about huge amounts of data, then, perhaps, over-protection can be organized through a terminal system with I / O on ... punched tapes? (Such terminals certainly cannot be infected with a virus.)
  8. 0
    6 June 2018 08: 42
    iCloud is Skynet’s hippocampus :) or they’re most likely building a mousetrap for spies where they will ask right at the entrance: - What secrets should you fill in? ... Come in, second door to the left :)
    1. 0
      6 June 2018 14: 26
      But this is strange.

"Right Sector" (banned in Russia), "Ukrainian Insurgent Army" (UPA) (banned in Russia), ISIS (banned in Russia), "Jabhat Fatah al-Sham" formerly "Jabhat al-Nusra" (banned in Russia) , Taliban (banned in Russia), Al-Qaeda (banned in Russia), Anti-Corruption Foundation (banned in Russia), Navalny Headquarters (banned in Russia), Facebook (banned in Russia), Instagram (banned in Russia), Meta (banned in Russia), Misanthropic Division (banned in Russia), Azov (banned in Russia), Muslim Brotherhood (banned in Russia), Aum Shinrikyo (banned in Russia), AUE (banned in Russia), UNA-UNSO (banned in Russia), Mejlis of the Crimean Tatar People (banned in Russia), Legion “Freedom of Russia” (armed formation, recognized as terrorist in the Russian Federation and banned)

“Non-profit organizations, unregistered public associations or individuals performing the functions of a foreign agent,” as well as media outlets performing the functions of a foreign agent: “Medusa”; "Voice of America"; "Realities"; "Present time"; "Radio Freedom"; Ponomarev; Savitskaya; Markelov; Kamalyagin; Apakhonchich; Makarevich; Dud; Gordon; Zhdanov; Medvedev; Fedorov; "Owl"; "Alliance of Doctors"; "RKK" "Levada Center"; "Memorial"; "Voice"; "Person and law"; "Rain"; "Mediazone"; "Deutsche Welle"; QMS "Caucasian Knot"; "Insider"; "New Newspaper"