skip to main content
10.1145/1854099.1854120acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

The development of information security operational management system based on the intelligent technologies

Published:07 September 2010Publication History

ABSTRACT

This paper is devoted to solving the problem of information security (IS) is operational management The mathematical provision of Information Security IS operational management system is developed. It is necessary to assess the probability with which the identified safety events can be classified as attacks, to develop the methods of decision making in conditions of uncertainty, and to develop models to counter the threats. The developed system allows to overcome the difficulties in weakly formalized situations of information confrontation. A higher quality level of operational management is achieved owing to the intellectual technologies: the procedural knowledge, fuzzy logical conclusion for the numerical evaluation of the attack probability.

References

  1. ISO/IEC 17799-2005. DOI= http://www.securitylab.ru/_download/document/GOST17799-2005.pdfGoogle ScholarGoogle Scholar
  2. ISO/IEC 27001. DOI= http://www.specon.ru/files/ISO27001.pdfGoogle ScholarGoogle Scholar
  3. ISO/IEC 13335-4-2007. Information technology. Methods and safety means. --2007. DOI= http://cntd9.pirit.info/document/ 1200051500.htmlGoogle ScholarGoogle Scholar
  4. Anfilatov, V. S. The system analysis in management: the manual / V. S. Anfilatov, A. A. Yemelyanov, A. A. Kukushkin; under edition of A. A. Yemelyanov. M.: Finansial and statistic, 2006. 368 p.(in Russian).Google ScholarGoogle Scholar
  5. Mashkina, I. V. Identification of threats on the basis of construction of semantic model of information system / I.V. Mashkina // USATU: Trans, Series "Management, computer engineering and computer science". Ufa: USATU, 2008. V.11. 1(28). pp. 208--214. (in Russian).Google ScholarGoogle Scholar
  6. Chernorutckiy, I. G. Decision-making methods / I. G. Chernorutckiy. SPb: BhV- Peterburg, 2005. 416 p. (in Russian).Google ScholarGoogle Scholar

Index Terms

  1. The development of information security operational management system based on the intelligent technologies

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SIN '10: Proceedings of the 3rd international conference on Security of information and networks
      September 2010
      286 pages
      ISBN:9781450302340
      DOI:10.1145/1854099

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 September 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate102of289submissions,35%
    • Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader