ABSTRACT
This paper is devoted to solving the problem of information security (IS) is operational management The mathematical provision of Information Security IS operational management system is developed. It is necessary to assess the probability with which the identified safety events can be classified as attacks, to develop the methods of decision making in conditions of uncertainty, and to develop models to counter the threats. The developed system allows to overcome the difficulties in weakly formalized situations of information confrontation. A higher quality level of operational management is achieved owing to the intellectual technologies: the procedural knowledge, fuzzy logical conclusion for the numerical evaluation of the attack probability.
- ISO/IEC 17799-2005. DOI= http://www.securitylab.ru/_download/document/GOST17799-2005.pdfGoogle Scholar
- ISO/IEC 27001. DOI= http://www.specon.ru/files/ISO27001.pdfGoogle Scholar
- ISO/IEC 13335-4-2007. Information technology. Methods and safety means. --2007. DOI= http://cntd9.pirit.info/document/ 1200051500.htmlGoogle Scholar
- Anfilatov, V. S. The system analysis in management: the manual / V. S. Anfilatov, A. A. Yemelyanov, A. A. Kukushkin; under edition of A. A. Yemelyanov. M.: Finansial and statistic, 2006. 368 p.(in Russian).Google Scholar
- Mashkina, I. V. Identification of threats on the basis of construction of semantic model of information system / I.V. Mashkina // USATU: Trans, Series "Management, computer engineering and computer science". Ufa: USATU, 2008. V.11. 1(28). pp. 208--214. (in Russian).Google Scholar
- Chernorutckiy, I. G. Decision-making methods / I. G. Chernorutckiy. SPb: BhV- Peterburg, 2005. 416 p. (in Russian).Google Scholar
Index Terms
The development of information security operational management system based on the intelligent technologies
Recommendations
Information Security Governance - Compliance management vs operational management
This paper discusses the difference that should exist between Information Security Operational Management and Information Security Compliance Management. The paper argues that for good Information Security Governance, good IT Governance and good ...
Security as a contributor to knowledge management success
Security is an important topic, but is it important for Knowledge Management (KM)? To date, little mainstream KM research is coming through with a security focus. This paper asks why, and proposes that security be integrated into KM success models. The ...
Security and Integrity Analysis Using Indicators
CYBERSECURITY '12: Proceedings of the 2012 International Conference on Cyber SecurityComputer systems today are under constant attack by adversaries that are looking for opportunistic ways to gain access and exfiltrate data, cause disruption or chaos, or leverage the computer for their own use. Whatever the motives are, these attacks ...
Comments