Methodical recommendations are presented on the use of models and methods of distributing of access and protection in the computer systems of critical application (СSСА). The simulation model of the system of distributing of access and protection is developed in СSСА. The method of choice of rational variant of tuning of parameters of СSСА is presented. The estimation of efficiency of the developed models and methods of distributing of access and protection is made in СSСА in the conditions of external influences.
computer system of critical application, external ill-intentioned influences, distributing of access, protection